All language subtitles for Common Network Ports - CompTIA A+ 220-1101 - 2

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:02,068 --> 00:00:05,839 In our previous video, we talked about how services have port numbers 2 00:00:05,839 --> 00:00:10,343 that they use so that other devices can communicate and use those services. 3 00:00:10,610 --> 00:00:14,614 We refer to these as well known port numbers, because both the server 4 00:00:14,614 --> 00:00:19,285 and the client need to know exactly what port number they'll use to communicate. 5 00:00:19,753 --> 00:00:22,222 This is not only important for the server and the client, 6 00:00:22,222 --> 00:00:24,124 but it's also important for any firewalls 7 00:00:24,124 --> 00:00:26,393 that may be in the middle of that communication. 8 00:00:26,393 --> 00:00:30,130 Firewalls have to decide whether to allow or disallow this traffic, 9 00:00:30,330 --> 00:00:33,333 and they often make that decision based on the port number. 10 00:00:33,633 --> 00:00:35,468 As we go through this video, you'll see that 11 00:00:35,468 --> 00:00:38,138 there are a lot of different port numbers that you should use, 12 00:00:38,138 --> 00:00:39,072 and if you've never worked 13 00:00:39,072 --> 00:00:42,809 with port numbers before, this will seem like rote memorization. 14 00:00:42,909 --> 00:00:44,344 But the port numbers themselves 15 00:00:44,344 --> 00:00:47,981 become easier and easier to remember as you continue to use them. 16 00:00:48,314 --> 00:00:50,283 It's important to know these port numbers 17 00:00:50,283 --> 00:00:53,553 and what protocols are often used by a particular port number. 18 00:00:53,720 --> 00:00:57,090 But it's also important to know when you would use these protocols. 19 00:00:57,223 --> 00:01:01,561 For example, your exam might ask you what port number is used by an application 20 00:01:01,561 --> 00:01:04,864 that transfers data in a particular way across the network. 21 00:01:05,765 --> 00:01:06,266 Let's start 22 00:01:06,266 --> 00:01:10,603 our conversation of port numbers with FTP or the File Transfer Protocol. 23 00:01:10,637 --> 00:01:11,738 As the name implies, 24 00:01:11,738 --> 00:01:15,241 this is a protocol that transfers files from one device to another. 25 00:01:15,508 --> 00:01:18,378 There are two port numbers used by FTP. 26 00:01:18,378 --> 00:01:20,346 One is TCP port 20. 27 00:01:20,346 --> 00:01:24,350 This is for data transfers and TCP port 21, 28 00:01:24,350 --> 00:01:27,353 which is used to control the data transfer. 29 00:01:27,454 --> 00:01:32,358 FTP is a generic way to transfer data between devices, but it commonly requires 30 00:01:32,358 --> 00:01:35,795 some type of authentication to log in to that remote device. 31 00:01:35,962 --> 00:01:39,999 So you might use a username and password, although some systems will allow you 32 00:01:39,999 --> 00:01:43,837 to log in as anonymous and use any password to gain access. 33 00:01:44,270 --> 00:01:45,305 The FTP protocol 34 00:01:45,305 --> 00:01:46,139 also includes 35 00:01:46,139 --> 00:01:49,876 a number of file management functions, so when you connect to an FTP server, 36 00:01:49,876 --> 00:01:51,978 you can list all of the files on that server. 37 00:01:51,978 --> 00:01:55,682 You can add, delete, rename and perform other file management 38 00:01:55,682 --> 00:01:57,717 functions, all by using FTP. 39 00:01:58,718 --> 00:01:59,819 There may be times when 40 00:01:59,819 --> 00:02:03,623 you need to connect to a remote device through a terminal or command line. 41 00:02:03,623 --> 00:02:04,457 Front end. 42 00:02:04,457 --> 00:02:07,393 It's common to use secure shell or SSH 43 00:02:07,393 --> 00:02:10,396 to provide this terminal connection to a remote device. 44 00:02:10,697 --> 00:02:14,501 SSH commonly communicates over TCP using port 22, 45 00:02:14,634 --> 00:02:19,105 and it has this text based front end to be able to access that remote device. 46 00:02:19,472 --> 00:02:22,842 Although we see plain text on our screen, any communication 47 00:02:22,842 --> 00:02:25,845 sent over the network is sent as encrypted data. 48 00:02:25,845 --> 00:02:27,714 That's where the secure comes from. 49 00:02:27,714 --> 00:02:29,949 In the name Secure Shell. 50 00:02:29,949 --> 00:02:31,050 There's another way to connect 51 00:02:31,050 --> 00:02:34,754 to a remote device using this text based or console front end, 52 00:02:34,921 --> 00:02:38,791 and it's using telnet or the telecommunication network protocol. 53 00:02:38,992 --> 00:02:43,263 Telnet commonly uses TCP port 23 to provide this connection. 54 00:02:43,563 --> 00:02:46,833 Just like SSH, telnet provides this text based front end 55 00:02:46,833 --> 00:02:50,203 that allows us to connect to the remote console of another device. 56 00:02:50,436 --> 00:02:55,041 But unlike SSH, all of the communication between this telnet front end 57 00:02:55,041 --> 00:02:59,379 and the telnet server is all sent in the clear or not encrypted. 58 00:02:59,612 --> 00:03:02,682 This means that anyone who might be capturing packets between 59 00:03:02,682 --> 00:03:06,419 these two devices will see everything that you're sending over this link, 60 00:03:06,419 --> 00:03:09,722 including usernames, passwords, and everything else. 61 00:03:10,023 --> 00:03:12,992 This is why we often say that you shouldn't use telnet 62 00:03:12,992 --> 00:03:14,427 on your production networks, 63 00:03:14,427 --> 00:03:18,264 and instead you should always use SSH for terminal communication. 64 00:03:19,499 --> 00:03:22,502 There are probably millions of email servers 65 00:03:22,502 --> 00:03:26,139 that are located on the internet, and the protocol that those email server 66 00:03:26,139 --> 00:03:31,377 use to communicate with each other is the Simple Mail Transfer Protocol or SMTp. 67 00:03:31,744 --> 00:03:35,815 SMTp commonly uses TCP using port 25. 68 00:03:36,049 --> 00:03:39,619 Not only is SMTp used to communicate between mail servers, 69 00:03:39,752 --> 00:03:43,890 but it's also used for our mail clients to send mail to a mail server. 70 00:03:44,023 --> 00:03:48,061 So if you're using a mail client on your mobile device or your desktop computer 71 00:03:48,061 --> 00:03:51,965 and you're sending an email message, you could be using SMTp. 72 00:03:52,532 --> 00:03:55,602 Although it's common to use SMTp to send mail, 73 00:03:55,668 --> 00:03:59,339 receiving mail is done using a completely different set of protocols. 74 00:03:59,439 --> 00:04:03,843 So if you were to look at your email client, you're probably using iMap or Pop3 75 00:04:03,843 --> 00:04:08,715 to be able to receive mail and SMTp to be able to send mail. 76 00:04:09,782 --> 00:04:13,052 If you need to connect to a remote website, you would probably type 77 00:04:13,052 --> 00:04:17,090 into your browser dub dub, dub dot Professor Messer com and hit enter. 78 00:04:17,357 --> 00:04:19,926 Behind the scenes, your system needs to be able 79 00:04:19,926 --> 00:04:22,729 to communicate with the Professor Messer web server, 80 00:04:22,729 --> 00:04:26,432 but it has no idea what the IP address is for that server 81 00:04:26,699 --> 00:04:31,170 to be able to resolve an IP address from that fully qualified domain name. 82 00:04:31,304 --> 00:04:34,874 Your system will use DNS or the Domain Name System. 83 00:04:35,208 --> 00:04:38,011 DNS commonly uses UDP port 53 84 00:04:38,011 --> 00:04:41,581 to be able to make this connection between you and the DNS server. 85 00:04:41,948 --> 00:04:44,417 These are obviously very critical resources 86 00:04:44,417 --> 00:04:48,921 because we don't often memorize IP addresses of servers, and very often 87 00:04:48,921 --> 00:04:52,492 server IP addresses can change without any type of notification. 88 00:04:52,692 --> 00:04:56,162 It's DNS that provides that resolution between a name 89 00:04:56,162 --> 00:05:00,033 that we're typing in on the browser, and the IP address that will be used for 90 00:05:00,033 --> 00:05:01,401 the actual communication. 91 00:05:02,735 --> 00:05:03,303 If you've ever 92 00:05:03,303 --> 00:05:07,173 used your mobile device on the Wi-Fi network of a coffee shop, 93 00:05:07,407 --> 00:05:11,811 then you've automatically received an IP address that you can use on that network. 94 00:05:12,045 --> 00:05:15,014 This IP address was assigned automatically using 95 00:05:15,014 --> 00:05:18,951 the Dynamic Host Configuration Protocol, or Dhcp. 96 00:05:19,319 --> 00:05:22,088 The well-known ports for Dhcp are UDP 97 00:05:22,088 --> 00:05:25,091 port 67 and UDP port 68. 98 00:05:25,291 --> 00:05:29,228 Of course, you need a Dhcp server to assign these IP addresses 99 00:05:29,228 --> 00:05:32,699 to devices on your network, but that functional is commonly built 100 00:05:32,699 --> 00:05:36,069 into the routers and wireless access points that we use these days. 101 00:05:36,402 --> 00:05:39,972 This Dhcp server will have a large pool of IP addresses 102 00:05:39,972 --> 00:05:42,975 that can then be assigned to devices on your network. 103 00:05:43,076 --> 00:05:45,678 All of these IP addresses are assigned in real time, 104 00:05:45,678 --> 00:05:50,183 so when you start up your computer, it queries the Dhcp server, and the Dhcp 105 00:05:50,183 --> 00:05:53,886 server assigns your device all of your IP configuration details. 106 00:05:54,520 --> 00:05:58,424 Dhcp uses a leasing system to assign these IP addresses, 107 00:05:58,558 --> 00:06:02,161 so you are only using this IP address for certain amount of time. 108 00:06:02,261 --> 00:06:05,498 And after that lease expires and you're no longer on the network, 109 00:06:05,498 --> 00:06:08,901 that IP address goes back in the pool for someone else to use. 110 00:06:09,502 --> 00:06:12,772 Network administrators can also configure Dhcp servers 111 00:06:12,772 --> 00:06:16,409 to always assign the same IP address to certain devices. 112 00:06:16,509 --> 00:06:20,880 So if there are routers, firewalls, switches, and other infrastructure devices 113 00:06:20,880 --> 00:06:21,848 on your network, 114 00:06:21,848 --> 00:06:25,918 your network administrator may configure Dhcp reservations. 115 00:06:25,918 --> 00:06:30,723 So those devices always receive the same IP address every time they're booted up. 116 00:06:31,157 --> 00:06:34,827 This also means that if you need to change any of the IP configurations 117 00:06:34,827 --> 00:06:37,630 on these devices, you don't have to go to the devices 118 00:06:37,630 --> 00:06:41,100 to make those changes, you simply make them on the Dhcp server. 119 00:06:41,134 --> 00:06:44,971 The next time that device requests the Dhcp address, it will receive 120 00:06:44,971 --> 00:06:46,139 the new configuration. 121 00:06:47,373 --> 00:06:48,441 If you've ever used a 122 00:06:48,441 --> 00:06:52,512 web browser, then you've used Http and Https. 123 00:06:52,745 --> 00:06:56,582 Http is the Hypertext Transfer Protocol, and this is 124 00:06:56,582 --> 00:07:00,319 the common protocol used by our browsers to communicate to web servers. 125 00:07:00,620 --> 00:07:03,723 There are two different protocols depending on the type of communication 126 00:07:03,723 --> 00:07:04,824 that you'll be doing. 127 00:07:04,824 --> 00:07:08,561 If you're communicating in the clear or in a non encrypted form. 128 00:07:08,594 --> 00:07:13,232 You would be using the Http protocol which uses TCP and port 80. 129 00:07:13,499 --> 00:07:15,001 If your browser's communicating 130 00:07:15,001 --> 00:07:19,272 over an encrypted connection, then it's probably using Https. 131 00:07:19,272 --> 00:07:23,843 The s being for secure and that uses TCP port 443. 132 00:07:25,144 --> 00:07:27,880 We mentioned earlier that sending email messages 133 00:07:27,880 --> 00:07:31,384 can use SMTp or the Simple Mail Transfer Protocol, 134 00:07:31,651 --> 00:07:35,988 but to receive email messages, you would commonly use Pop3 or iMap. 135 00:07:36,222 --> 00:07:41,661 Pop3 is the Post Office Protocol version three, and it commonly uses TCP port 110. 136 00:07:41,961 --> 00:07:44,764 Pop3 was designed to retrieve email messages 137 00:07:44,764 --> 00:07:48,968 to an email client, but it wasn't built for multiple email clients. 138 00:07:48,968 --> 00:07:52,104 And of course, these days we tend to walk around with many different 139 00:07:52,104 --> 00:07:55,808 mobile devices, all accessing the same email inbox 140 00:07:56,042 --> 00:07:59,178 to be able to synchronize across all of these different mailboxes. 141 00:07:59,212 --> 00:08:04,350 We commonly use iMap for or the Internet Message Access Protocol version four. 142 00:08:04,617 --> 00:08:10,156 iMap commonly uses TCP port 143 to be able to download and manage that mailbox. 143 00:08:11,491 --> 00:08:14,927 Many operating systems have their own method of transferring 144 00:08:14,927 --> 00:08:18,831 files and information between devices using that operating system. 145 00:08:19,065 --> 00:08:22,969 Windows commonly uses server message block or SMB 146 00:08:22,969 --> 00:08:24,971 to be able to provide this connection. 147 00:08:24,971 --> 00:08:28,040 This is the protocol commonly used by Microsoft Windows, 148 00:08:28,074 --> 00:08:30,409 so if you're transferring files between devices 149 00:08:30,409 --> 00:08:34,380 or you're sending a print job to a printer, it's probably using SMB. 150 00:08:34,747 --> 00:08:39,919 You might also hear SMB referenced as CIFs or the Common Internet File System. 151 00:08:40,286 --> 00:08:43,923 SMB uses a number of different protocols to be able to communicate, 152 00:08:43,923 --> 00:08:45,958 and if you're communicating to an older windows 153 00:08:45,958 --> 00:08:49,762 machine, you're probably using net bias over tcp IP. 154 00:08:49,795 --> 00:08:53,099 Net Bios is the network basic input output system. 155 00:08:53,366 --> 00:08:57,203 This uses UDP port 137 as a name service function, 156 00:08:57,236 --> 00:09:00,973 so that it can find devices on your network by the name, and uses 157 00:09:00,973 --> 00:09:05,745 TCP port 139 to set up a session and transfer data between devices. 158 00:09:06,345 --> 00:09:09,415 In most modern versions of windows that Bios isn't used, 159 00:09:09,415 --> 00:09:13,352 devices can communicate directly between each other using TCP IP. 160 00:09:13,586 --> 00:09:16,355 In those cases, it would use a direct SMB 161 00:09:16,355 --> 00:09:19,392 connection using TCP port 445. 162 00:09:19,625 --> 00:09:21,627 This allows us to have a direct SMB 163 00:09:21,627 --> 00:09:25,698 communication between two devices by using only TCP, IP. 164 00:09:26,699 --> 00:09:29,268 If you plan on doing any work as a network administrator, 165 00:09:29,268 --> 00:09:33,973 you'll become very familiar with S&P or the Simple Network Management Protocol. 166 00:09:34,206 --> 00:09:38,578 S&P allows a network management device to query these infrastructure devices 167 00:09:38,578 --> 00:09:42,481 for performance details, and receive those metrics in return. 168 00:09:42,715 --> 00:09:46,385 This uses UDP port 161 to perform these queries. 169 00:09:46,652 --> 00:09:49,689 You can also configure the infrastructure device to monitor 170 00:09:49,689 --> 00:09:52,758 for certain metrics, and if it exceeds any of those metrics, 171 00:09:52,925 --> 00:09:55,828 it can send an alert to the management station. 172 00:09:55,828 --> 00:10:00,866 We refer to these alerts as traps, and the traps use UDP port 162. 173 00:10:01,400 --> 00:10:04,170 If you're configuring SMP on a device, it will ask you 174 00:10:04,170 --> 00:10:05,671 if you're using version one. 175 00:10:05,671 --> 00:10:07,974 Version two, or version three. 176 00:10:07,974 --> 00:10:11,210 Version one was obviously the original SNMp version. 177 00:10:11,410 --> 00:10:14,013 It sends structured information across the network. 178 00:10:14,013 --> 00:10:18,084 But all of this information was sent in the clear or in a non encrypted form. 179 00:10:18,384 --> 00:10:22,288 We introduced a newer version of SMP with us AMP version two, 180 00:10:22,388 --> 00:10:25,625 which allowed us to do bulk transfers of information. 181 00:10:25,625 --> 00:10:29,795 But still all of that information was being sent in a non encrypted form. 182 00:10:30,062 --> 00:10:33,332 To be able to include additional security with us and AMP. 183 00:10:33,532 --> 00:10:35,935 You need to use S&P v3. 184 00:10:35,935 --> 00:10:39,071 This includes encryption that allows us to have message integrity 185 00:10:39,238 --> 00:10:42,642 authentication and encryption of all of the SNMp data. 186 00:10:44,076 --> 00:10:47,480 We use directories extensively on our modern networks. 187 00:10:47,480 --> 00:10:52,251 And one very common protocol to use to query these directories is Ldap. 188 00:10:52,351 --> 00:10:55,321 Ldap is the Lightweight Directory Access Protocol, 189 00:10:55,388 --> 00:10:58,391 and it commonly uses TCP port 389. 190 00:10:58,624 --> 00:11:03,362 There are many implementations of Ldap, but one of the most popular is Microsoft 191 00:11:03,362 --> 00:11:07,199 Active Directory, which allows you to query that Active Directory Server 192 00:11:07,199 --> 00:11:10,202 using the Ldap protocol. 193 00:11:10,436 --> 00:11:13,305 If you've ever worked in a support role or on a helpdesk, 194 00:11:13,305 --> 00:11:17,810 then you've probably performed some type of remote access to someone's desktop. 195 00:11:18,044 --> 00:11:21,313 One very popular protocol to provide this remote communication 196 00:11:21,480 --> 00:11:24,450 is RDP or the Remote Desktop Protocol. 197 00:11:24,717 --> 00:11:28,554 This is the standard protocol used by windows for the remote sharing, 198 00:11:28,654 --> 00:11:32,091 and it commonly uses TCP port 3389. 199 00:11:32,491 --> 00:11:36,362 These remote desktop services are available in many different editions 200 00:11:36,362 --> 00:11:37,163 of windows, 201 00:11:37,163 --> 00:11:40,232 and if you're using windows today, then you probably have built 202 00:11:40,232 --> 00:11:43,302 into the operating system the ability to connect to 203 00:11:43,436 --> 00:11:46,439 or receive a remote desktop session. 204 00:11:46,472 --> 00:11:50,109 RDP can be used to take over and control an entire system, 205 00:11:50,276 --> 00:11:53,579 or just to run a single application from that server. 206 00:11:53,813 --> 00:11:58,150 Although you'll find servers running RDP almost exclusively on windows, 207 00:11:58,150 --> 00:12:01,754 there are clients that you can run on almost any operating system. 208 00:12:01,921 --> 00:12:06,592 So if you're running Linux, Mac OS, Android, or any other operating system, 209 00:12:06,592 --> 00:12:09,395 there's probably an application you can load that will allow you 210 00:12:09,395 --> 00:12:13,332 to connect to a windows device using the Remote Desktop Protocol. 20066

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.