Measurement & Sensors

Total Page:16

File Type:pdf, Size:1020Kb

Measurement & Sensors iETHERNET DESIGN CONTEST WINNERS P. 30 • DESIGN YOUR OWN CONTROLLER CIRCUITRY P. 70 • PROGRAMMABLE LOGIC 101 P. 76 w w w . c i r c u i t c e l l a r . c o m CIRCUITTHE MAGAZINE FOR COMPUTER CELLAR APPLICATIONS #214 May 2008 MEASUREMENT & SENSORS Build An Ultrasonic Height-Sensing System Electronic Data Logging & Motion Analysis The coLinux Development Platform Making Sense Of Compiler Output Construct A Portable LCR Meter ATA Interfaces For I/O Apps 05> 7925274 75349 $4.95 U.S. ($5.95 Canada) C2.qxp 3/3/2008 11:16 AM Page 1 SERIAL TO ETHERNET SOLUTIONS Simple Ethernet connectivity for serial devices Works out of the box - no programming is required Device P/N: SB70-100CR Customize to suit any Kit P/N: NNDK-SB70-KIT application with low-cost $69 SB70 development kit 2-port serial-to-Ethernet server Features: Qty. 100 with TTL support 10/100 Ethernet TCP/UDP mode DHCP/Static IP Support Data rates up to 921.6kbps Web-based configuration Need a custom solution? NetBurner Serial to Ethernet Development Kits are available Device P/N: SB72-EX-100CR to customize any aspect of Kit P/N: NNDK-SB72EX-KIT operation including web pages, data filtering, or custom network SB72EX $139 applications. All kits include 2-port serial-to-Ethernet server platform hardware, ANSI C/C++ Qty. 100 with RS-232 & RS-485/422 support compiler,TCP/IP stack, web server, e-mail protocols, RTOS, flash file system, Eclipse IDE, debugger, cables and power supply. Device P/N: PK70EX-232CR Information and Sales | [email protected] Kit P/N: NNDK-PK70EX232-KIT Web | www.netburner.com $269 PK70EX232 Telephone | 1-800-695-6828 4-port serial-to-Ethernet server Qty. 100 with RS-232 support 1.qxp 4/10/2008 12:50 PM Page 1 35.?AD?%$PDF !- 2.qxp 4/2/2008 1:34 PM Page 1 3.qxp 1/30/2008 12:00 PM Page 1 ent Disp sc la e y r s o u l F m u u c a vfdV Graphic Display Value Approaching Character Display Prices A Display You Can Read From Any Angle RoHS Compliant ISO 9001 Certified 9001 140001 TS16949 Noritake 7000 Series MORE BUILT-IN FEATURES THAN YOU MAY EVER NEED... Up to 4 Independent Windows with Individual Control 8 Levels of Brightness Control Many Int’l Font Sets with 16 User-Defined Characters Built-in Screen Savers Easily Combine Text & Graphics on One Screen Many Filters Available to Match Application Horizontal & Vertical Scrolling Development Kit Available Proportional Fonts & Font Magnification DON’T COMPROMISE. Your application deserves VFD quality ... Noritake VFD Backlit LCD www.noritake-elec.com/51m Noritake Co., Inc. 2635 Clearbrook Dr., Arlington Heights, IL 60005 phone 1-800-779-5846 e-mail [email protected] Over 100 Years in Business Task_Masthead_214.qxp 4/9/2008 9:09 AM Page 4 TASK MANAGER DIY Measurement And Sensing Projects FOUNDER/EDITORIAL DIRECTOR CHIEF FINANCIAL OFFICER Steve Ciarcia Jeannette Ciarcia During the past two decades, measurement and sensing technologies MANAGING EDITOR MEDIA CONSULTANT have become increasingly important in the daily lives of average con- C. J. Abate Dan Rodrigues sumers. Today, a typical American home has at least one measurement WEST COAST EDITOR CUSTOMER SERVICE or sensor system that features embedded technologies. Electronic tem- Tom Cantrell Debbie Lavoie perature-measuring systems, health-monitoring medical devices, CONTRIBUTING EDITORS CONTROLLER motion-sensing security networks, and interactive gaming systems are Jeff Bachiochi Jeff Yanco Ingo Cyliax common examples. Robert Lacoste ART DIRECTOR KC Prescott As most of our long-time readers know well, many of these technolo- George Martin gies were first developed by members of the embedded design commu- Ed Nisley GRAPHIC DESIGNER Grace Chen nity and then presented in the pages of Circuit Cellar. For instance, back NEW PRODUCTS EDITOR John Gorsky Carey Penney in Circuit Cellar Issue 2 (March/April 1988), we ran an article by Tom STAFF ENGINEER Riley about building a four-channel, temperature-logging system. In PROJECT EDITORS Gary Bodley John Gorsky Circuit Cellar Issue 26 (April/May 1992), we ran an article by our founder Ken Davidson Steve Ciarcia about building a “people tracking” system for his house. David Tweed Such IR systems are ubiquitous these days. More recently, we ran James ASSOCIATE EDITOR Koehler’s article about building a proton precession magnetometer Jesse Smolin (Circuit Cellar Issue 202, May 2007). These are only a few of the dozens of articles about measurement and sensor systems that we’ve published ADVERTISING over the years. 860.875.2199 • Fax: 860.871.0411 • www.circuitcellar.com/advertise This month, we present four new articles about do-it-yourself meas- PUBLISHER urement and sensor projects. I encourage you to read through each arti- Sean Donnelly cle and try your hand at at least one of these exciting projects. Direct: 860.872.3064, Cell: 860.930.4326, E-mail: [email protected] Starting on page 16, Gerhard Oberforcher takes you step by step ADVERTISING REPRESENTATIVE Shannon Barraclough through the process of building a PIC-based ultrasonic snow depth sen- Direct: 860.872.3064, E-mail: [email protected] sor. Even if you don’t need to take accurate snow depth measurements, ADVERTISING COORDINATOR you can use the principles described in this article to build a measure- Valerie Luster ment system for various other purposes. E-mail: [email protected] Miguel Rusch’s prize-winning LCR meter will be a great addition to your workbench (p. 34). The meter enables you to monitor the analog Cover photography by Chris Rakoczy—Rakoczy Photography performance of any device under test. www.rakoczyphoto.com Turn to page 41 to learn how Steve Lubbers built a seizure-monitor- PRINTED IN THE UNITED STATES ing system for his dog. Following Steve’s advice will help you design a CONTACTS truly 21st-century electronic data logging and monitoring system. This SUBSCRIPTIONS Information: www.circuitcellar.com/subscribe, E-mail: [email protected] project proves that you can use your engineering skills to monitor seri- Subscribe: 800.269.6301, www.circuitcellar.com/subscribe, Circuit Cellar Subscriptions, P.O. Box 5650, ous, life-threatening conditions. Hanover, NH 03755-5650 Address Changes/Problems: E-mail: [email protected] Jeff Bachiochi presents the last theme-related article in the issue. In GENERAL INFORMATION 860.875.2199, Fax: 860.871.0411, E-mail: [email protected] “Control Circuitry,” he explains how to build a controller that can interact Editorial Office: Editor, Circuit Cellar, 4 Park St., Vernon, CT 06066, E-mail: [email protected] with your favorite gaming console (p. 70). Using your design and pro- New Products: New Products, Circuit Cellar, 4 Park St., Vernon, CT 06066, E-mail: [email protected] AUTHORIZED REPRINTS INFORMATION gramming expertise to tweak an existing sensor-based gaming system 860.875.2199, E-mail: [email protected] can be an affordable alternative to buying the next expensive product to AUTHORS Authors’ e-mail addresses (when available) are included at the end of each article. hit the market. Once you’ve read through these engaging articles, be sure to check out CIRCUIT CELLAR®, THE MAGAZINE FOR COMPUTER APPLICATIONS (ISSN 1528-0608) is published monthly by Circuit Cellar David Lynch’s follow-up article on embedded Linux development (p. 52), Incorporated, 4 Park Street, Vernon, CT 06066. Periodical rates paid at Vernon, CT and additional offices. One-year (12 issues) subscription rate USA and possessions $23.95, Canada/Mexico $34.95, all other countries $49.95.Two-year (24 issues) sub- Wolfgang Matthes’s article on ATA interfaces (p. 60), Tom Cantrell’s intro- scription rate USA and possessions $43.95, Canada/Mexico $59.95, all other countries $85. All subscription orders payable in U.S. funds only via Visa, MasterCard, international postal money order, or check drawn on U.S. bank. Direct subscription orders duction to MAX II technology (p. 76), and George Martin’s article about and subscription-related questions to Circuit Cellar Subscriptions, P.O. Box 5650, Hanover, NH 03755-5650 or call “looking” into his C compiler (p. 83). 800.269.6301. Finally, take some time to study the amazing projects that placed at Postmaster: Send address changes to Circuit Cellar, Circulation Dept., P.O. Box 5650, Hanover, NH 03755-5650. the top of the WIZnet iEthernet Design Contest (p. 30). The projects range Circuit Cellar® makes no warranties and assumes no responsibility or liability of any kind for errors in these programs or schematics or for the consequences of any such errors. Furthermore, because of possible variation in the quality and condition of materials and workmanship of read- er-assembled projects, Circuit Cellar® disclaims any responsibility for the safe and proper function of reader-assembled projects based upon or from an innovative WIZ810MJ-based irrigation timer/controller to a handy from plans, descriptions, or information published by Circuit Cellar®. embedded server application that enables you to find airfare deals on the The information provided by Circuit Cellar® is for educational purposes. Circuit Cellar® makes no claims or warrants that readers have a right to build things based upon these ideas under patent or other relevant intellectual property law in their jurisdiction, or that readers have a right to construct or operate any of the devices described herein under the relevant patent or other intellectual property law of the reader’s jurisdiction. Internet. Congratulations to all of the winners! The reader assumes any risk of infringement liability for constructing or operating such devices. Entire contents copyright © 2008 by Circuit Cellar, Incorporated. All rights reserved. Circuit Cellar is a registered trademark of Circuit Cellar, Inc.
Recommended publications
  • List of TCP and UDP Port Numbers from Wikipedia, the Free Encyclopedia
    List of TCP and UDP port numbers From Wikipedia, the free encyclopedia This is a list of Internet socket port numbers used by protocols of the Transport Layer of the Internet Protocol Suite for the establishment of host-to-host communications. Originally, these ports number were used by the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP), but are also used for the Stream Control Transmission Protocol (SCTP), and the Datagram Congestion Control Protocol (DCCP). SCTP and DCCP services usually use a port number that matches the service of the corresponding TCP or UDP implementation if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[1] However, many unofficial uses of both well-known and registered port numbers occur in practice. Contents 1 Table legend 2 Well-known ports 3 Registered ports 4 Dynamic, private or ephemeral ports 5 See also 6 References 7 External links Table legend Use Description Color Official Port is registered with IANA for the application white Unofficial Port is not registered with IANA for the application blue Multiple use Multiple applications are known to use this port. yellow Well-known ports The port numbers in the range from 0 to 1023 are the well-known ports. They are used by system processes that provide widely used types of network services. On Unix-like operating systems, a process must execute with superuser privileges to be able to bind a network socket to an IP address using one of the well-known ports.
    [Show full text]
  • Release Notes 2020 Callswitch Platform 6.0 Callswitch Communicator 6.0
    ‘Together we are stronger.’ RELEASE NOTES 2020 CALLSWITCH PLATFORM 6.0 CALLSWITCH COMMUNICATOR 6.0 www.unitetelecoms.co.uk TABLE OF OF CONTENTSCONTENTS INTRO CALLSWITCH PLATFORM V6.0 CALLSWITCH PLATFORM FEATURES MEETING MOBILE CHAT FILE SHARING SERVICE (FSS) AUTHENTICATION SECURITY IMPROVEMENTS MUSIC ON HOLD: AUTOMATIC SOUND CONVERSION AUTOMATIC SOUND CONVERSION FOR MUSIC ON HOLD GREETING ACCESS CODES IVR TREE EMERGENCY CALL NOTIFICATION SYSTEM > SOUND SIMPLIFICATION (SEARCH) PHONE BOOK WAKE-UP CALLS SHORT CODE CALLER IDS NEW CALL CENTRE AND DIALLER CALLER ID LIST (WITH EMERGENCY CALLER ID) CALL FORWARDING IMPORT AND EXPORT .CSV FOR OPERATION TIME DIRECT CONVERSION OF GREETING SOUND FILES CRM INTEGRATION SEND SOUND FILES OF CONFERENCES TO AN EMAIL ADDRESS SYSTEM > SOUND FILES > SEARCH PAGE SIMPLIFICATION AND UPLOAD IMPROVEMENTS 022 WANT TO KNOW MORE ABOUT ABOUT OUR OUR PRODUCTS? PRODUCTS? PLEASE PLEASE VISIT VISIT WWW.UNITETELECOMS.CO.UK WWW.TELCOSWITCH.COM OROR EMAILEMAIL [email protected]@TELCOSWITCH.COM. CALLSWITCH CONTACT CENTRE FEATURES AGENT STATISTICS AGENT GROUP IMPROVEMENTS AGENT REAL TIME STATISTICS BLENDING MODE (INBOUND/OUTBOUND) CALL AGENT BY NUMBER (DIRECT IN CALL) DIALLER MONITOR PAGES NEW MENU PROJECT CODES SKILL-BASED ROUTING (SBR) SCHEDULING REPORTS CALLSWITCH COMMUNICATOR V6.0 CALLSWITCH COMMUNICATOR FEATURES UNIFIED PRESENCE NEW DESIGN FOR AGENT EDITION OUTBOUND CALL CENTRE (DIALLER) PERSONAL CALLBACK INTEGRATED WEB BROWSER FOR CRM POPUP, CALL POPUP AND QUEUE URL POPUP PROJECT CODES EXTENDED SUPERVISOR
    [Show full text]
  • List of TCP and UDP Port Numbers - Wikipedia, the Free Encyclopedia 6/12/11 3:20 PM
    List of TCP and UDP port numbers - Wikipedia, the free encyclopedia 6/12/11 3:20 PM List of TCP and UDP port numbers From Wikipedia, the free encyclopedia (Redirected from TCP and UDP port numbers) This is a list of Internet socket port numbers used by protocols of the Transport Layer of the Internet Protocol Suite for the establishment of host-to-host communications. Originally, these port numbers were used by the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP), but are used also for the Stream Control Transmission Protocol (SCTP), and the Datagram Congestion Control Protocol (DCCP). SCTP and DCCP services usually use a port number that matches the service of the corresponding TCP or UDP implementation if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[1] However, many unofficial uses of both well-known and registered port numbers occur in practice. Contents 1 Table legend 2 Well-known ports: 0–1023 3 Registered ports: 1024–49151 4 Dynamic, private or ephemeral ports: 49152–65535 5 See also 6 References 7 External links Table legend Color coding of table entries Official Port/application combination is registered with IANA Unofficial Port/application combination is not registered with IANA Conflict Port is in use for multiple applications (may be official or unofficial) Well-known ports: 0–1023 The port numbers in the range from 0 to 1023 are the well-known ports. They are used by system processes that provide widely-used types of network services.
    [Show full text]
  • NCID - Network Caller ID User Manual
    NCID - Network Caller ID User Manual Copyright © 2014-2021 Authors: John L Chmielewski Todd A Andrews Last edited: Sep 26, 2021 Table of Contents Introduction Getting Started Installation Obtaining Caller ID Supported Clients Client Output Modules Using NCID FAQ Verbose Levels Contributors TODO LICENSE Introduction NCID (Network Caller ID) is Caller ID (CID) distributed over a network to a variety of devices and computers. The NCID server monitors either a modem, Caller ID device, or gateway (e.g., SIP, VoIP, smartphones) for the CID data. The data is collected and sent, via TCP, to one or more connected clients. The server supports multiple gateways which can be used with or without a modem or device. The server also supports one line text messages. The NCID project website is the central place to go for the latest downloads, updated documentation and user/technical support for the official NCID package and its optional client packages. This document contains information on how to get started with NCID, the hardware needed, a Frequently Asked Questions (FAQ) section and a TODO list. It also provides information on supported clients, gateways and optional server features. Troubleshooting information is also provided. Getting Started Table of Contents NCID can be overwhelming for users who have never used it. Current users of NCID are probably not aware of all of its features, or how to use them properly. This document will try to help with those cases. The FAQ should also be of some help. In this document: NCID is the package name ncidd is the server name ncid is the client name Unix is a generic term to mean any UNIX-like or Linux-like operating system, e.g., Fedora, FreeBSD, Mac OS X, Debian, etc.
    [Show full text]
  • List of TCP and UDP Port Numbers from Wikipedia, the Free Encyclopedia
    List of TCP and UDP port numbers From Wikipedia, the free encyclopedia This is a list of Internet socket port numbers used by protocols of the transport layer of the Internet Protocol Suite for the establishment of host-to-host connectivity. Originally, port numbers were used by the Network Control Program (NCP) in the ARPANET for which two ports were required for half- duplex transmission. Later, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for full- duplex, bidirectional traffic. The even-numbered ports were not used, and this resulted in some even numbers in the well-known port number /etc/services, a service name range being unassigned. The Stream Control Transmission Protocol database file on Unix-like operating (SCTP) and the Datagram Congestion Control Protocol (DCCP) also systems.[1][2][3][4] use port numbers. They usually use port numbers that match the services of the corresponding TCP or UDP implementation, if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[5] However, many unofficial uses of both well-known and registered port numbers occur in practice. Contents 1 Table legend 2 Well-known ports 3 Registered ports 4 Dynamic, private or ephemeral ports 5 See also 6 References 7 External links Table legend Official: Port is registered with IANA for the application.[5] Unofficial: Port is not registered with IANA for the application. Multiple use: Multiple applications are known to use this port. Well-known ports The port numbers in the range from 0 to 1023 are the well-known ports or system ports.[6] They are used by system processes that provide widely used types of network services.
    [Show full text]
  • NCID Manual Pages
    NCID Manual Pages Copyright © 2018-2021 NCID Development Team Last edited: June 27, 2021 INDEX(0) INDEX(0) Index NCID Package: Server • Server ncidd.8 4 • Server Alias File ncidd.alias.5 11 • Server Blacklist file ncidd.blacklist.5 12 • Server Whitelist file ncidd.whitelist.5 14 • Server Configuration file ncidd.conf.5 15 • Server Recordings ncid_recordings.7 17 ServerHangup Extensions • Overviewncid_extensions.7 18 • Calls hangup−calls.1 19 • Closed hangup−closed−skel.1 20 • Call twoextensions hangup−combo−skel.1 21 • • Fake Numbers hangup−fakenum.1 22 • FCC Complaint Calls List hangup−fcc.1 23 • Message hangup−message−skel.1 24 • No hangup on anycalls hangup−nohangup.1 25 • Skel hangup−skel.1 26 Client • Client ncid.1 27 • Client configuration file ncid.conf.5 30 Client Modules • Overviewncid_modules.7 31 • Alert ncid−alert.1 33 • Initmodem ncid−initmodem.1 34 • Kpopup ncid−kpopup.1 35 • Notify ncid−notify.1 36 • Page ncid−page.1 37 • Samba ncid−samba.1 40 • Speak ncid−speak.1 41 • MySQL ncid−mysql.1 42 • MythTV ncid−mythtv.1 44 • Skel ncid−skel.1 45 • Wakeup ncid−wakeup.1 47 • Yacncid−yac.1 48 Gateways • Overviewncid_gateways.7 49 • Email to NCID email2ncid.1 50 1 INDEX(0) INDEX(0) • Email to NCID configuration file email2ncid.conf.5 52 • Obihai devices to NCID obi2ncid.1 53 • Obihai devices to NCID configuration file obi2ncid.conf.5 57 • NCID to NCID ncid2ncid.1 58 • NCID to NCID configuration file ncid2ncid.conf.5 61 • Remote Notifier to NCID rn2ncid.1 62 • Remote Notifier to NCID configuration file rn2ncid.conf.5 64 • SIP to NCID sip2ncid.8 66 •
    [Show full text]
  • NCID API Documentation
    NCID API Documentation API 1.11 Last edited: August 3, 2021 Copyright © 2010-2021 John L Chmielewski Todd A Andrews This document contains information needed to develop servers, clients, client output modules and gateways for NCID (Network Caller ID). All example phone numbers and names contained herein are intended to be fictional. There are 5 feature sets of NCID conformance: Feature Set 1: Modem and Device Support (required) Feature Set 2: Gateway Support (optional) Feature Set 3: Client Job Support (optional) Feature Set 4: Acknowledgment Support (optional) Feature Set 5: Relay Job Support (optional) Table of Contents Before you begin ABOUT CONFIGURATION OPTIONS FOR SERVER IMPLEMENTATIONS ABOUT END-OF-LINE TERMINATORS ABOUT LINE TYPES AND FIELD PAIRS ENSURING CONNECTIVITY WITH THE SERVER COMPANION DOCUMENTS Call/Message Line Types, Categories and Structure (new in API 1.7) OVERVIEW TABLE {CALLTYPE} CATEGORY STRUCTURE {MSGTYPE} CATEGORY STRUCTURE Server Output Lines Client/Gateway Output Lines Feature Set 1: Modem and Device Support SERVER IMPLEMENTATION Server Output Lines Server Alias Support Server Hangup Support Modem-to-Server Optional Server Extensions Optional Server Hangup Extension Optional NetCallerID Device-to-Server Optional TCI Device-to-Server (new in API 1.1) CLIENT IMPLEMENTATION Client-to-Server Optional Client-to-Module Optional Client-to-TiVo Display (Removed in API 1.6) Feature Set 2: Gateway Support SERVER IMPLEMENTATION XDMF Input (new in API 1.8) Server Output Lines GATEWAY IMPLEMENTATION Gateway-to-Server Forwarding
    [Show full text]
  • Hacking Voip Takes a Dual Approach to Voip and Home Voip Solutions Like Yahoo! and Security, Explaining Its Many Security Holes to Vonage Hackers and Administrators
    HA “I CaN HEAR YOU NOW.” HACKING CKIN VoIP HIMANSHU PROTOCOLS, ATTACKS, AND COUNTERMEASURES DWIVEDI G Voice over Internet Protocol (VoIP) networks security assessment tools, the inherent vulner- abilities of common hardware and software have freed users from the tyranny of big telecom, V allowing people to make phone calls over the packages, and how to: Internet at very low or no cost. But while VoIP is o > Identify and defend against VoIP security easy and cheap, it’s notoriously lacking in secu- I attacks such as eavesdropping, audio injection, rity. With minimal effort, hackers can eavesdrop P caller ID spoofing, and VoIP phishing on conversations, disrupt phone calls, change > Audit VoIP network security caller IDs, insert unwanted audio into existing > Assess the security of enterprise-level VoIP phone calls, and access sensitive information. networks such as Cisco, Avaya, and Asterisk, Hacking VoIP takes a dual approach to VoIP and home VoIP solutions like Yahoo! and security, explaining its many security holes to Vonage hackers and administrators. If you’re serious > Use common VoIP protocols like H.323, SIP, about security, and you either use or administer and RTP as well as unique protocols like IAX VoIP, you should know where VoIP’s biggest > Identify the many vulnerabilities in any VoIP weaknesses lie and how to shore up your security. network And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is Whether you’re setting up and defending your your map and guidebook. VoIP network against attacks or just having sick Hacking VoIP will introduce you to every aspect fun testing the limits of VoIP networks, Hacking of VoIP security, both in home and enterprise VoIP is your go-to source for every aspect of VoIP implementations.
    [Show full text]
  • List of TCP and UDP Port Numbers - Wikipedia, the Free Encyclopedia
    List of TCP and UDP port numbers - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers List of TCP and UDP port numbers From Wikipedia, the free encyclopedia This is a list of Internet socket port numbers used by protocols of the Transport Layer of the Internet Protocol Suite for the establishment of host-to-host connectivity. Originally, these port numbers were used by the Network Control Program (NCP) and two ports were needed as transmission was done at half duplex. As Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) were adopted, only one port was needed. The even numbered ports were dropped. This is why some even numbers in the well-known port number range are unassigned. TCP and UDP port numbers are also used for the Stream Control Transmission Protocol (SCTP), and the Datagram Congestion Control Protocol (DCCP). SCTP and DCCP services usually use a port number that matches the service of the corresponding TCP or UDP implementation if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses. [1] However, many unofficial uses of both well-known and registered port numbers occur in practice. Contents 1 Table legend 2 Well-known ports 3 Registered ports 4 Dynamic, private or ephemeral ports 5 See also 6 References 7 External links Table legend Use Description Color Official Port is registered with IANA for the application [1] White Unofficial Port is not registered with IANA for the application Blue Multiple use Multiple applications are known to use this port.
    [Show full text]
  • List of TCP and UDP Port Numbers 1 List of TCP and UDP Port Numbers
    List of TCP and UDP port numbers 1 List of TCP and UDP port numbers This is a list of Internet socket port numbers used by protocols of the Transport Layer of the Internet Protocol Suite for the establishment of host-to-host communications. Originally, these ports number were used by the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP), but are also used for the Stream Control Transmission Protocol (SCTP), and the Datagram Congestion Control Protocol (DCCP). SCTP and DCCP services usually use a port number that matches the service of the corresponding TCP or UDP implementation if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[1] However, many unofficial uses of both well-known and registered port numbers occur in practice. Table legend Use Description Color Official Port is registered with IANA for the application white Unofficial Port is not registered with IANA for the application blue Multiple use Multiple applications are known to use this port. yellow Well-known ports The port numbers in the range from 0 to 1023 are the well-known ports. They are used by system processes that provide widely-used types of network services. On Unix-like operating systems, a process must execute with superuser privileges to be able to bind a network socket to an IP address using one of the well-known ports. Port TCP UDP Description Status 0 UDP Reserved Official 1 TCP UDP TCP Port Service Multiplexer (TCPMUX) Official [2] [3]
    [Show full text]
  • List of TCP and UDP Port Numbers
    List of TCP and UDP port numbers Table legend Color coding of table entries Official Port/application combination is registered with IANA Unofficial Port/application combination is not registered with IANA Conflict Port is in use for multiple applications (may be official or unofficial) Wellknown ports: 0–1023 The port numbers in the range from 0 to 1023 are the wellknown ports. They are used by system processes that provide widelyused types of network services. On Unixlike operating systems, a process must execute with superuser privileges to be able to bind a network socket to an IP address using one of the ports. Port TCP UDP Description Status 0 UDP Reserved Official 1 TCP UDP TCP Port Service Multiplexer (TCPMUX) Official 2 TCP UDP CompressNET[2] Management Utility[3] Official 3 TCP UDP CompressNET[2] Compression Process[4] Official 4 TCP UDP Unassigned Official 5 TCP UDP Remote Job Entry Official 6 TCP UDP Unassigned Official 7 TCP UDP Echo Protocol Official 8 TCP UDP Unassigned Official 9 TCP UDP Discard Protocol Official 10 TCP UDP Unassigned Official 11 TCP UDP Active Users (systat service)[5][6] Official 12 TCP UDP Unassigned Official 13 TCP UDP Daytime Protocol (RFC 867) Official 14 TCP UDP Unassigned Official 15 TCP UDP netstat service[5] Unofficial 16 TCP UDP Unassigned Official 17 TCP UDP Quote of the Day Official 18 TCP UDP Message Send Protocol Official 19 TCP UDP Character Generator Protocol (CHARGEN) Official 20 TCP FTP—data transfer Official 21 TCP FTP—control (command) Official 22 TCP UDP Secure Shell (SSH)—used for secure logins, file transfers (scp, sftp) and port for warding Official 23 TCP Telnet protocol—unencrypted text communications Official 24 TCP UDP Privmail: any private mail system.
    [Show full text]