Network Communications Uncovered: Exploring Ports, Protocols, and Scanners in Action
Understanding how devices communicate on a network is a cornerstone of Information Technology. At the heart of this communication are ports and protocols – the essential rules and channels that govern data flow across systems. Whether you're troubleshooting a network issue, performing a security assessment, or mapping out assets, knowing how to identify open ports, active services, and connected endpoints is critical.
This tutorial is designed to introduce and reinforce core concepts of ports, protocols, and network discovery through hands-on use of popular network scanning tools – including Advanced IP Scanner, Nmap, and its graphical counterpart Zenmap. By the end, you’ll not only have a strong theoretical grasp but also practical experience scanning a live network, interpreting results, and identifying potential security and infrastructure insights.
Note: Only run scanning tools on networks where you have explicit permission from the owner or administrator.
It all starts with the TCP/IP (Transmission Control Protocol/Internet Protocol) suite. The TCP/IP Suite is the fundamental communication framework of computer networking and the Internet that allows devices to connect and communicate across the Internet and most modern networks. It is a suite of protocols that work together to transmit data between computers.
TCP/IP is comprised of two fundamental transport layer protocols to facilitate computer network communications over local and remote networks. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
While TCP focuses on reliable, ordered communication, UDP is designed for speed and simplicity. It’s used when applications care more about performance than guaranteed delivery, for such example such as video streaming or voice/video communications.
Feature | TCP | UDP |
---|---|---|
Type | Connection-oriented | Connectionless |
Delivery | Reliable, ordered, checked | Unreliable, unordered |
Speed | Slower | Faster |
Use Case | Web, email, file transfer | Streaming, gaming, VoIP |
Port numbers exist at the Transport Layer of TCP/IP. They act as logical endpoints, identifying specific services or applications running on a device.
Analogy: If an IP address is a building's address, the port number is the apartment number.
Port | Protocol | Service | Description |
---|---|---|---|
20/21 | TCP | FTP | File Transfer Protocol |
22 | TCP | SSH | Secure remote access |
23 | TCP | Telnet | Remote shell (unencrypted) |
25 | TCP | SMTP | Email sending |
53 | UDP/TCP | DNS | Domain name resolution |
80 | TCP | HTTP | Insecure web browsing |
443 | TCP | HTTPS | Secure web browsing |
3389 | TCP | RDP | Remote Desktop Protocol |
445 | TCP | SMB | File sharing on Windows networks |
These five core protocols/services play a foundational role in making our everyday digital experiences possible.
DNS acts as the internet's phonebook, translating human-friendly domain names (like google.com) into IP addresses (like 142.250.190.78) that computers use to identify each other on a network. Without DNS, you’d have to remember the exact IP address of every website or service you want to access. Every time you type a URL or click a link, DNS silently resolves it for you. It’s the first step in nearly every online interaction.
DHCP automatically assigns IP addresses and network configuration details (like subnet masks, default gateways, and DNS servers) to devices on a network. Thanks to DHCP, your device connects to Wi-Fi and just works – no manual IP settings required. It allows for quick, scalable, and conflict-free connectivity across home, office, and public networks.
SMTP is the protocol used to send outgoing emails from a client (like Outlook or Gmail) to a mail server, or between mail servers themselves. Every time you hit “send”, SMTP handles the delivery process behind the scenes – routing your message across servers until it reaches its destination inbox.
IMAP lets your email client retrieve and sync messages from a mail server while keeping them on the server. It’s what makes email synchronization possible across multiple devices—read, delete, or organize on one device and it’s reflected everywhere.
HTTP governs how browsers and servers communicate. HTTPS is the encrypted version, protecting credentials and personal data from interception. Today, HTTPS is essential for nearly every website.
These protocols work together to enable everything from browsing the web, sending email, and connecting to networks, to keeping your inbox in sync. They’re the invisible architecture of digital life.
Each enables remote control of systems and should be secured with encryption, firewalls, and VPNs.
RDP lets users remotely access a Windows desktop with full GUI, clipboard, and audio redirection—commonly over TCP 3389.
SSH provides encrypted remote shell access (and tunneling/file transfer) for Unix/Linux—commonly over TCP 22.
VNC is cross-platform screen sharing over the RFB protocol—commonly over TCP 5900.
All three enable remote management. RDP/VNC offer GUIs; SSH is CLI-first. Harden with firewalls, VPNs, and least-exposure principles.
To scan for devices on a network using Advanced IP Scanner, enter the default gateway followed by the subnet CIDR (in this case, /24). Then click “Scan” to begin. For each device it detects, you’ll see hostname, IP, manufacturer, and MAC address.
Nmap discovers hosts, services, and potential exposures by sending crafted packets and analyzing responses.
Scan types:
-sS
: TCP SYN scan-sU
: UDP scan-A
: Aggressive (OS, services, scripts)--script vuln
: Run vulnerability detection scriptssudo nmap -sn 10.38.1.115
Purpose: Ping scan (host discovery).
Ideal for quickly identifying live devices.
sudo nmap -sS 10.38.1.115
Purpose: TCP SYN (stealth) scan.
sudo nmap -sU 10.38.1.115
Purpose: UDP port scan.
sudo nmap -A 10.38.1.115
Purpose: Aggressive scan.
sudo nmap --script vuln 10.38.1.115
Purpose: Run the vuln
script category.
This lab revealed the layers of modern networking—from the TCP/IP model to port numbers and protocols like TCP/UDP and services like DNS, DHCP, SMTP, and HTTP/HTTPS. Then we moved from theory to practice using Advanced IP Scanner, Nmap, and Zenmap to uncover endpoints, services, and potential vulnerabilities.
Understanding what devices are on your network, what ports are open, and what services are running is essential knowledge for anyone in IT, cybersecurity, or network management.
This lab builds a strong foundation for network security, system administration, and vulnerability assessment.