Network Communications Uncovered: Exploring Ports, Protocols, and Scanners in Action

View this project on GitHub

Introduction

Understanding how devices communicate on a network is a cornerstone of Information Technology. At the heart of this communication are ports and protocols – the essential rules and channels that govern data flow across systems. Whether you're troubleshooting a network issue, performing a security assessment, or mapping out assets, knowing how to identify open ports, active services, and connected endpoints is critical.

This lab is designed to introduce and reinforce core concepts of ports, protocols, and network discovery through hands-on use of popular network scanning tools – including Advanced IP Scanner, Nmap, and its graphical counterpart Zenmap. By the end, you’ll not only have a strong theoretical grasp but also practical experience scanning a live network, interpreting results, and identifying potential security and infrastructure insights.

Note: Only run scanning tools on networks where you have explicit permission from the owner or administrator.

What You’ll Learn



Section 1: The Foundation – TCP/IP, Ports, and Protocols

What is TCP/IP?

It all starts with the TCP/IP (Transmission Control Protocol/Internet Protocol) suite. The TCP/IP Suite is the fundamental communication framework of computer networking and the Internet that allows devices to connect and communicate across the Internet and most modern networks. It is a suite of protocols that work together to transmit data between computers.

TCP/IP is comprised of two fundamental transport layer protocols to facilitate computer network communications over local and remote networks. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).

While TCP focuses on reliable, ordered communication, UDP is designed for speed and simplicity. It’s used when applications care more about performance than guaranteed delivery, for such example such as video streaming or voice/video communications.

TCP vs. UDP

FeatureTCPUDP
TypeConnection-orientedConnectionless
DeliveryReliable, ordered, checkedUnreliable, unordered
SpeedSlowerFaster
Use CaseWeb, email, file transferStreaming, gaming, VoIP

What Are Port Numbers?

Port numbers exist at the Transport Layer of TCP/IP. They act as logical endpoints, identifying specific services or applications running on a device.

Analogy: If an IP address is a building's address, the port number is the apartment number.
PortProtocolServiceDescription
20/21TCPFTPFile Transfer Protocol
22TCPSSHSecure remote access
23TCPTelnetRemote shell (unencrypted)
25TCPSMTPEmail sending
53UDP/TCPDNSDomain name resolution
80TCPHTTPInsecure web browsing
443TCPHTTPSSecure web browsing
3389TCPRDPRemote Desktop Protocol
445TCPSMBFile sharing on Windows networks


Section 2: Core Network Services

These five core protocols/services play a foundational role in making our everyday digital experiences possible.

DNS - Domain Name Service

DNS acts as the internet's phonebook, translating human-friendly domain names (like google.com) into IP addresses (like 142.250.190.78) that computers use to identify each other on a network. Without DNS, you’d have to remember the exact IP address of every website or service you want to access Every time you type a URL or click a link, DNS silently resolves it for you. It’s the first step in nearly every online interaction.

DHCP - Dynamic Host Configuration Protocol

DHCP automatically assigns IP addresses and network configuration details (like subnet masks, default gateways, and DNS servers) to devices on a network. Thanks to DHCP, your device connects to Wi-Fi and just works – no manual IP settings required. It allows for quick, scalable, and conflict-free connectivity across home, office, and public networks.

SMTP - Simple Mail Transfer Protocol

SMTP is the protocol used to send outgoing emails from a client (like Outlook or Gmail) to a mail server, or between mail servers themselves. Every time you hit “send”, SMTP handles the delivery process behind the scenes – routing your message across server until it reaches its destination inbox. Without SMTP, modern email communication wouldn’t be possible.

IMAP - Internet Message Access Protocol

IMAP is a protocol that allows your email client to retrieve and sync messages from a mail server, while keeping them stored on the server itself. IMAP is what makes email synchronizing possible across multiple devices. When you read, delete, or organize email on your phone, those changes show up instantly on your laptop too – because IMAP keeps everything in sync on the server.

HTTP – HTTPS – Hypertext Transfer Protocol / Secure

HTTP is the protocol that governs how web browsers and servers communicate, transferring web pages, images, scripts, and more. HTTPS is the secure, encrypt version of HTTP. It’s what loads every web page you visit. HTTP ensures your data – such as login credentials, credit card info, and personal details – are encrypted and protected from prying eyes. In today’s internet, HTTPS isn’t just important – it’s essential.

The Bigger Picture – Why These Five Are Essential

These five protocols work together to enable everything from browsing the web, sending emails, and connecting to networks, and even keeping your inbox in sync. They represent the invisible architecture of digital life. Without them:

They’re the unsung heroes of the internet – working behind the scenes every second of every day.



Section 3: Remote Access Protocols

Each enables remote control of systems and should be secured with encryption, firewalls, and VPNs.

RDP - Remote Desktop Protocol

RDP is a proprietary protocol developed by Microsoft that allows users to remotely access and control a Windows computer’s graphical interface over a network connection. It transmits the full desktop environment including audio and clipboard sharing, enabling seamless remote interaction as if sitting directly at the machine. RDP typically operations over TCP port 3389 and is widely used in enterprise environments for IT support, remote administration, and virtual desktop infrastructure (VDI).

SSH - Secure Shell

SSH is a cryptographic network protocol used to securely access and manage systems – primarily Unix – or Linux-based – through a command-line interface. Unlike RDP, SSH doesn’t transmit a graphical interface by default, but focuses on encrypted remote shell access, file transfers, and port forwarding. SSH operates over TCP port 22 and is commonly used by system administrators and developers for secure server management.

VNC - Virtual Network Computing

VNC is a cross-platform remote access protocol that allows a user to remotely control another system’s graphical interface by transmitting screen updates and keyboard/mouse input over the network. Unlike RDP, VNC is platform-independent and uses Remote Framebuffer (RFB) protocol. It typically runs on TCP port 5900 and is often used for remote support, desktop sharing, and lightweight access to non-Windows systems.

How RDP, SSH, and VNC Are Similar

All three protocols – RDP, SSH, and VNC – enables remote access to systems across a network, allowing administrators or users to manage machines without being physically present.

They serve the common purpose of remote control and system interaction; though they differ in how they deliver that experience. RDP and VNC both provide graphical desktop access, while SSH provides secure command-line control.

Each uses its own communication port and encryption method, but all three can be secured through firewalls, VPNs, or tunneling to limit exposure and ensure safe remote connectivity.



Section 4: Tool Showcase – Network Scanners

Advanced IP Scanner

AdvancedIPScanner

To scan for devices on a network using Advanced IP Scanner, enter the default gateway followed by the subnet CIDR (in this case, /24). Then, click "Scan" in the top-left corner to begin scanning for online devices connected to the specific network.

For each device it detects, Advanced IP Scanner will display the hostname, IP address, manufacturer, and MAC address.



Nmap – The Powerhouse

Nmap (Network Mapper) is a powerful, open-source network scanning tool used to discover hosts, services, and vulnerabilities on a network. It works by sending specially crafted packets to target systems and analyzing their responses.

Nmap is widely used by:

Whether you're scanning a single device or mapping an entire network, Nmap provides deep insight into what's running, where it's running, and how it's communicating - making it one of the most versatile tools in the industry.


Nmap Linux Commands

sudo nmap -sn 10.38.1.115

Purpose: Perform a ping scan (aka "host discovery").

What it does:

nmapsn.png

Ideal for quickly identifying live devices on a network




sudo nmap -sS 10.38.1.115

Purpose: Run a TCP SYN scan (stealth scan).

What it does:

nmapsS.png

This is Nmap's default scan type and is useful for staying low-profile during recon.




sudo nmap -sU 10.38.1.115

Purpose: Perform a UDP port scan

What it does:

nmapsU.png

Use this to identify services running over UDP, which are often overlooked but critical




sudo nmap -A 10.38.1.115

Purpose: Perform an aggressive scan on the target

What it does:

nmapA.png

Great for gathering detailed recon on a single target in one go.




sudo nmap --script vuln 10.38.1.115

Purpose: Run the vulnerability scanning script category.

What it does

nmapvuln.png

Useful for vulnerability enumeration, but can be noisy and intrusive on live systems





Zenmap

Zenmap


Section 5: Lab Walkthrough

  1. Run a basic discovery scan with Advanced IP Scanner
  2. Identify 2-3 live devices
  3. Use Nmap and Zenmap to:
  4. Document findings


Conclusion

This lab revealed the interconnected layers of modern networking, beginning with the TCP/IP model and its role in routing and delivering data. We explored how port numbers distinguish services on a host, how protocols like TCP and UDP define transmission behavior, and how core services like DNS, DHCP, SMTP, and HTTP/HTTPS make the internet function.

Then, we transitioned from theory to practice with hands-on exploration using Advanced IP Scanner, Nmap, and Zenmap — seeing how these tools help uncover endpoints, services, and potential vulnerabilities across a network.

Understanding what devices are on your network, what ports are open, and what services are running is essential knowledge for anyone in IT, cybersecurity, or network management.

With this lab, you’ve built a strong foundation to support further learning in network security, system administration, and vulnerability assessment.

Back to Home