Install and Configure GNS3

•March 12, 2010 • Leave a Comment

GNS3 is a Graphical Network Simulator that allows emulation of complex networks. You may be familiar with VMWare or Virtual PC that are used to emulate various operating systems in a virtual environment. These programs allow you to run operating systems such as Windows XP Professional or Ubuntu Linux in a virtual environment on your computer. GNS3 allows the same type of emulation using Cisco Internetwork Operating Systems. It allows you to run a Cisco IOS in a virtual environment on your computer. GNS3 is a graphical front end to a product called Dynagen. Dynamips is the

core program that allows IOS emulation. Dynagen runs on top of Dynamips to create a more user friendly, text-based environment. A user may create network topologies using simple Windows ini-type files with Dynagen running on top of Dynamips. GNS3 takes this a step further by providing a graphical environment.

GNS3 allows the emulation of Cisco IOSs on your Windows or Linux based computer. Emulation is possible for a long list of router platforms and PIX firewalls. Using an EtherSwitch card in a router, switching platforms may also be emulated to the degree of the card’s supported functionality. This means that GNS3 is an invaluable tool for preparing for Cisco certifications such as CCNA and CCNP. There are a number of router simulators on the market, but they are limited to the commands that

the developer chooses to include. Almost always there are commands or parameters that are not supported when working on a practice lab. In these simulators you are only seeing a representation of the output of a simulated router. The accuracy of that representation is only as good as the developer makes it. With GNS3 you are running an actual Cisco IOS, so you will see exactly what the IOS produces and will have access to any command or parameter supported by the IOS. In addition, GNS3 is an open source, free program for you to use. However, due to licensing restrictions, you will have to provide your own Cisco IOSs to use with GNS3. Also, GNS3 will provide around 1,000 packets per second throughput in a virtual environment. A normal router will provide a hundred to a thousand times greater throughput. GNS3 does not take the place of a real router, but is meant to be a tool for learning and testing in a lab environment. Using GNS3 in any other way would be considered improper.

GNS3 was developed primarily by Jeremy Grossmann. Additional developers involved in creating GNS3 are David Ruiz, Romain Lamaison, Aurélien Levesque, and Xavier Alt. Dynamips was developed by Christophe Fillot. Dynagen’s primary developer was Greg Anuzelli. There are a lot of other people that have assisted in various ways in the development of these products. Development is an ongoing process as each product evolves.

Download the below link , and ensure that you have installed latest version of adobe acrobat reader



How to access windows files from Ubuntu On Virtual Box.

•March 16, 2010 • 1 Comment

How to share your windows partitions to Ubuntu or any Linux distributions residing on your Virtual Box

VirtualBox: access Windows-host shared folders from Ubuntu-guest

So the topology is like this you have client operating system Windows XP and Guest operating system as Linux (Ubuntu) here J on your virtual box. For simplicity again I am telling you, you Installed VirtualBox on Windows platform and Ubuntu is installed inside the VirtualBox and you need to share your windows partition or folder to Ubuntu O/S on Virutal Box

Then Here we go,
Share windows partition with VirtualBoX  SO ubuntu can access windows files.:)J J J


1)      Create a topology like in the exhibit (See Picture 1).Obliviously  you have the same topology

2)      Share the windows Partition/Folder; See the exhibit number “Picture 2”.

3)      Check the Network Connections see the exhibit number “Picture 3”.


I think all of you done the step one to three and those are very simple task .

Picture 1

Picture 1


sharing my computer view Picture 2

Above I shared My C:\ Drive ,

It is a very simple task , select the drive by using mouse And right click on it – select Properties tab -> sharing – Click Blue Color Sentence -> mark allow sharing -> apply -> Ok

How to share Picture 2

How to share Picture 2

Network Connections, I have some more Network adapters that’s for my personal use. , You should have two Network adapters.

Here I given My IP as automatic , We can Give the IP no problem . But it is better don’t give the IP now , We can give it later after the first run 🙂 🙂 :), that makes our troubleshooting easier for a while.

🙂 🙂

My network places , I need to share C:\ to VirtualBox so You Can See the Shared Partition Here

My network places , I need to share C:\ to VirtualBox so You Can See the Shared Partition Here

Okay Here we go the most funniest and thrilling part with VirtualBox and LinuxBee.

I need to end this topic very soon because I am sitting in front of this computer from more than 32 hours ago. I was busy with configuring gns3, Configure Cisco SDM in GNs3 by using Microsoft Loopback and Find how to get different Network in Virtual Box. means I find how to create different Network using Virtual box. So I can create Different LAN in My gns 3 .for getting clear all those things . Gns3 will provide Network Infrastructure and Virtual Box will provide different Hosts for Different Lan ,

yes that I need for creating sophisticated topologies 🙂

Okay . The above things are nor for you but I just posted .If you have any doubt regarding those things I can help you . Mail me : 🙂

Okay , Let’s move : so

Log inside the Ubuntu as Root

take the console ,

su –

password  root

Log in as Root , hari is user and I loged as Root here use su -

Log in as Root , hari is user and I loged as Root here use su -

You need to login as a root , that is must . if u have problems to loin as root , You shoud find out why u can’t login as a root?? that is super important.

otherwise it won’t work !!!! , search in the Google they will give u default password of root , each distributions may have different default passwords.

First you have to make sure that have install Guest Additions. From the VirtualBox’s menu go to Devices → Install Guest Additions… This will mount a virtual CD on your /media/cdrom. Normally this folder’s window will show up. As root run the program When the program completes reboot your VirtualBox.

Mount the Guest Additions installations Image. Notice CD ICon on Desktop

Mount the Guest Additions installations Image. Notice CD ICon on Desktop

With Guest Additions installed you may now go ahead and define the shared folder(s). From the VirtualBox’s menu go to Devices → Shared Folders. A dialog will show up. In this dialog you can specify which folder from your Windows system you want to share with your Ubuntu. Press the button with the + symbol to add a new shared folder in the list. You will have to specify a Folder Name for each folder you add. Make sure you memorize that name because you will need it very soon.

I named it as Windowsc

shared folder mark it as permanet and select the path also Name the folder we need the same name for mounting

shared folder mark it as permanet and select the path also Name the folder we need the same name for mounting

When done with you shared folder(s) specification, you may now go ahead and actually mount these folders from Ubuntu. First you have to create a mounpoint, that is, a directory in your Ubuntu which will reflect the shared folder from Windows:


su –

root password

cd /

mkdir /mnt/windows

creating mount points , I am using windows as mount point , u can select any name and remember we need this exact filename for mounting so don't forget

creating mount points , I am using windows as mount point , u can select any name and remember we need this exact filename for mounting so don't forget

Of course you may choose an alternative path for your mountpoint. With your mountpoint created you can now mount the shared folder, like this:’


vim /etc/fstab

last line type

windowsc            /mnt/windows         vboxsf             defaults         0           0


cat /etc/fstab  will display the changes



Command for mounting

mount -a


mount /mnt/windows

mounting fstab - Hi it is Permanent mounting so whenever you are using linux you can access windows

mounting fstab - Hi it is Permanent mounting so whenever you are using linux you can access this window folder/partition

Restart the Machine

go to


you can access the windows now

if you have any doubts please ask  me: Email me :  or you can comment it here

u can see windows partiton here

u can see windows partiton here



How to delete a ACCESS DENIED file in Windows

•March 14, 2010 • 1 Comment

How to Delete Trojan Horse From Windows .

Every time AVG is popping about the Trojan but It is not removing from PC

So Here We go 🙂

A Trojan is a virus program that hides inside another program file. It will often just attach itself to a separate file and you will not be able to tell the virus is inside the file. However, when you open the file or execute the file, that is when the Trojan will become active, and it will start doing damage to your computer, usually first by attaching itself to other, similar files, before it does damage, making it even harder to remove. A good anti-virus program will enable you to get rid of all copies of most Trojan viruses.

Actually I like Linux very much because the file system is far far better than windows.  And it is secure. The another easiest thing in Linux is the Root user (Administrator) can do anything in Linux, he can change the permission attribute and everything.

In short Linux is a good Operating System to do whatever you need. And It will always encourage us to do it. But in Windows it is error and virus prone. To be frank Linux is like Java feature means, it is very powerful and can implement any high end applications.

Most often I ask myself what’s the heck is this, Virus, Virus, Virus. Ohh man actually I was quite distressed in those days. My important data are attacked by Malware, Trojans, and Worms. These wreakers are dangerous freakers of Microsoft. To be frank I am expressing my anger here.

So I would like to flag one thing here, which is my Indention in this Documentation.

Can u guess what it is, !!!!!

It’s a grand testimony of Linux Operating System.” Linux Distributions are awesome with excellent Performance, Powerful Kernel with GNOME and KDE graphical Environments. This makes Linux inevitably stronger operating systems than any others .Moreover they are spreading the Jasmines of open source technology”

Thanks to Mr.Linux Torvalds.

Well Most of us like to use Windows because of it user friend ness. So keeping our Operating system and data secure is a difficult task. These are the important preventions and troubleshooting mechanisms you can follow against these vulnerabilities.


How to make windows little secure and free from hazards

Ok Here we gooo !!!!……..


1)                  Install the Operating System(windows) in X drive ( example C:\ or D:\) Drive

2)                  Install all Programs and Applications in another partition means (if you install windows (operating system) in C:\  drive install all the programs and applications in D :\”). Program files contains so many (.exe) files so it can easily inflected by virus so make different partitions for program files and operation systems files.

1)                  Go to Control Panel -> Security Centre ->Automatic updates -> Turn Off Automatic Updates. (If you are using a Pirated O/S) OR

2)                  Go to Start Menu -> Click Run  -> type SYSDM.CPL

Then you will get System properties tab

In system properties tab -> goto -> Remote  -> Disable(unmark the two fields) –> Click Apply. (Don’t click Ok or don’t close it)

1)                  Goto  Automatic updates and disable it

1)                  Goto -> System Restore-> Turn Off System Restore.

1)                  Apply and save all those things

1)                  Click ok

Yes now you are on the way to keep windows protected

1)                  Install antivirus ( , I will recommend AVG because it is fully functional and free for 30 days .and Scan your system.

2)                  Enable Firewall Policies and Allow needed applications to communicate over Internet

3)                  Backup your Data in an External Hard disk or  your inside itself and Convert the data to zip format by using WinZip or Convert it to ISO magic ISO software, Use this links to get WinZip and magic ISO

4) Get one Live CD of Linux Distributions. Ubuntu is good for Home users

you can raise a request here and It is free !!!!!!

5) Once in a Month Scan the Operating System by using AVG, or even you

find that you are infected with Virus and AVG is alerting it and every time .or

Your antivirus can’t remove the infected file. Or you want to remove a Locked File .

15)       hmm,  you can’t delete a file and getting this as output “ Can’t Delete the file ,Access    Denied “  , You tried everything in windows to remove the file , you tried to remove forcefully and  tried to remove from safe mode. Tried to change the attributes of the files, But even IT is NOT DELETED.

Things going to change here, Here we go ooo .. Linux Beee

We need Linux O/S here

If you are not installed Linux on your machine. The Best choice is Use Ubuntu Live CD . No Installation is needed

1) Just reboot the system and select boot from CD Rom , Click Enter “that’s it J it will a virtual Operating System and Hard Disk space for you.

2) In Linux command prompt is called Command Terminal , If you know command Terminal Delete the File Using Command Terminal

3) If you don’t know anything about Linux ,  you just explore the file system and find the files you need to delete JJ

If the file name is “hazard.dll”, in windows, In Linux ,in the same file name you find two files. And one files is  “Hazard.dll”, And another one is “Hazard.dll.bak”. So remove both. J

Why antivirus can’t remove it?? , Why we need to disable “System Restore”??. Why AVG is always Popping up alerts in each startup ??? !!!!!.

Actually Antivirus is removing the files but the windows system restoring feature may backup the files to earlier states.


The another reason is  , there might be two files . One file is the Master files and we are always deleting the child files. A master file is spawning new children in each startup. Trojan Horse Master files are difficult to find in Windows but you can find it in Linux.



So Linux is the Real King . This is the very Very Simple Example to Like Linux ,

There are  Lot to say about his BIG “B”


Email me :


Delete contents of Prefetch and Temporary folder

•March 12, 2010 • Leave a Comment

Gaining Speed: Empty

Prefetch on your XP System

A little known tweak that can help you gain some performance on your XP Professional (and Windows Server 2003) related systems is to periodically empty the prefetch folder. The prefetch folder is used to help speed up the loading of programs; XP will load programs it thinks you need before you ask for them yourself.

Since applications are nothing other than data (files, folders which make up the programs), they are susceptible to the same form of punishment all other data on your system is open to… defragmentation, as well as just residing on your hard disk, if needed, the program must be called from the disk and loaded into memory. If XP (or 2003) tries to prefetch applications you don’t regularly use, then you may be wasting memory. In this article, we look at how to speed up performance by emptying the little known prefetch folder and allowing XP to start the prefetch determination and archiving process over again.

Prefetch Basics

The prefetch folder resides on your local hard disk, under the Windows folder.




Where ‘X’ is the drive letter where you have Windows installed. Either path will get you to your local system. The second path is for those who have the default installation on the most commonly used drive letter, C:\

The prefetch folder is used for speeding up your system. The way it does this is by doing the following:

  • Windows XP is configured to prefetch application and program components so that when you load them to memory; it appears to be very quick.
  • When XP does this the first time, it winds up copying portions of the program to the prefetch area of your local disk.
  • When XP boots up, XP will prefetch portions of the files you use the most.
  • XP loads all associated files, libraries, and pointers necessary to run the program in advance, the preloaded subset makes your system appear quicker.

Prefetch when unattended can also slow down your system. This is because over time

  • XP will retain a copy of a portion of a program in the prefetch folder even if you only use it one time, which is not good. Since you may not use the program again, you may impact the performance of your system by having portions of a program you do not use loaded in your system’s memory.
  • XP systems with very low hardware resources (such as memory and hard disk space) will definitely be affected by an over-bloated prefetch folder.

Open and Empty the Prefetch Folder

To view the contents of your prefetch folder, you only need to open to it. You can follow the path outlined earlier to view the prefetch folder. You can use Date Created or Modified fields to attempt to figure out how old each prefetch file is, this may help you determine what can be deleted and what you may want to keep. The easiest way to do this however is to just delete the contents and then start to open and use your common programs again – XP will go back through the same process and prefetch what you need.

You’ll then see the contents of a very full prefetch file as seen on this XP client:


hari windows prefetch folder

The layout.ini file can also be deleted without a problem. *.ini files are ‘information files’ that are used by Windows to make configurations. Layout.ini contains prefetch information for XP’s disk defragmentation system (defrag). Information in this file is used by the defragmenter to move programs and files on your workstation’s hard drive to a more favorable location, speeding up direct read times.

Cleaning out the folder

As you can see, just like the TEMP directory on your system, the Prefetch folder can fill up with lots of unused entries and take up needed space. The folder space isn’t really what you are solely worried about, it’s all this ‘preloaded in memory’ stuff that you are trying to avoid. Memory is priceless… it’s what makes your system ‘seem’ fast. In reality, you load everything from your hard disk… the more memory your system has, the more the operating system will attempt to load and keep loaded in memory. You always… always want to keep this area as free and clear as possible because when it fills up – it immediately impacts the system. Paging from disk to memory and back again taxes system resources and slows down your system. As well, running out of hard disk space simultaneously puts a strain on your system’s page file, which needs all available free hard disk space to accommodate ‘virtual memory’. In sum, you can improve system performance by deleting files from this folder not only to keep it out of memory but to also keep it off your hard disk. This is not space that will be gained back unless you are using fewer programs now then you were at another time. An example may be if you previously used many Graphic Art tools and now you aren’t. Since these tools and their environments are so large, removing the prefetch files for these tools may claim a lot in system resources back for you.

When cleaning out your folder, you have two choices: Selective or All

You can be selective or you can mass delete everything. Ctrl + A and then Del. Gone. No problems doing it that way, again – you can regenerate what you need upon reboot and reload. You can also be very selective, although the first method is the easiest, quickest and most effective way of doing it. Remember – to delete all the files, simply select them all in Explorer and select the delete key on your keyboard. Reboot, re-launch your programs and you are back in business. Programs no longer used often will remain dormant until used again.

You shouldn’t delete these files often because then your system is constantly taxed in creating file and then you deleting them. This of course will put a strain on your hard disk and leave you needing another defrag. Use this tweak sparingly, remembering it when you do spring cleaning. You can tie this into a routine when you ‘delete’ unused programs, go and clear out the prefetch folder… cleaning out any other temp related folders and then a scandisk and defrag. If you spend a few bucks and get a memory upgrade, your system will ‘appear’ much quicker. As well, you will reclaim some serious hard disk space – and clear out memory as well. Heck, you may not even need that new stick of memory after you clean out your system. So, is there anyway to modify prefetch? Yes there is.

Changing Prefetch settings

To change settings for your Prefetch folder, you may need to take a trip into the system’s Registry. You can do this with Regedit.

Start => Run => type Regedit => Enter

Now that you are in the Registry, you can change the way that Prefetch behaves by making a change in the registry. This is helpful when you want to alter Prefetch or disable Prefetch completely. Low resource (memory, hard disk space, etc) systems may need this functionality disabled to get the system to run more efficiently.

When the Registry Editor Dialog box opens, navigate to this value:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters

In the right side pane, look for the key named EnablePrefetcher. The value of this key represents how Prefetch will operate.

Values you can choose from include:

0: Disable

1: Application Launch Prefetch

2: Boot Prefetch

3: Prefetch everything

Simply type the number in that you want (keep all other settings the same) and click OK. Rebooting the system will give you the new Prefetch setting.


In this article we covered the basics of cleaning out the Prefetch folder and gaining more speed on your XP (or 2003) system. Stay tuned for more tweaks!

So Hari’s suggestions is delete the Prefetch  folder , that decrease performance for a while , later it will increase the performance and  reduces virus attacks .

So delete the temporary folders and prefetch folders periodically

Hooraaayyy, You have done

But when you next start your mozilla or internet explore just keep an eye on prefetch folder , you can understand the process very well, so friends  you have to install missing plugins while browsing. don’t bother about that it will take only few minutes



System Requirements

•March 12, 2010 • Leave a Comment

A good PC
Windows xp or greater or Linux Distributions
I am suggesting you some applications that are necessary for e-learning, and the orbit helps you to download videos and pdf files from this website and from youtube or from any streaming video website and it is most awarded downloading software now

okay another software you required is adobe acrobat reader download and install it.

Mozilla fire fox latest version

TCP/IP , what is protocol number and Protocol type field in IP header

•March 11, 2010 • 1 Comment

Hi welcome one all , welcome to the exciting world of Networking , here as I said earlier these are the fundaments of Networking . So guys please understand these things .These are super important.

So we can start with TCP/IP

What is this TCP/IP ? . What’s the heck is this ?? ,

Hmm ,

As you know that we have standard for network communication called OSI Reference Model , TCP is Transmission Control Protocol l , and UDP “User Data gram Protocol”  both are working in the Layer 4 “Transport Layer” of the OSI Reference Model.

TCP/IP is a compressed version of OSI Reference Model having 4 Layers But OSI Reference Model having 7 layers.

So I am not like to discuss a lot theory here, If you need to Know more detail please go through the website or books . But I would like to represent the Main Key Points which I know about this will be here



Connection oriented Protocol

Saying as Reliable why? Because Acknowledgement, sequencing and flow control is here

Acknowledgment and Sequencing bit size is 32 Bit that you can notice in TCP header.

Flow control Mechanisms are, Buffering, Windowing, Congestion avoidance.

Sliding Window Protocol is doing Windowing; It can Automatically adjust the Windowing size. Why need windowing is simple, if we acknowledge one by one package it takes time and so many acknowledgement packets and Lot Processing is required in order to reduce this traffic and processing, A separate mechanism introduced only a box of packet can acknowledge. That is windowing.

There are lots to say. Will say about this later.

TCP Protocol number is 0cX 06 , It is a Hexadecimal digit that you can see in the IP Header Protocol type field it says the packet to what to do with next layer.

And UDP  protocol number is 0CX 17 , so it means it will tell the transport layer to USE UDP header and send the Packet through UDP

So Now you understand how Virtual Circuit is creating or How Transport Layer knows what to do with the Packet. Yes of course  there are separate TCP and UDP header that will says the Port number and CRC, error correcting every thing , the Data link layer find the errors in the packets and Host to Host layer correct the Errors in the Packets

If you need to know the Port numbers , source and destination you need to check with TCP header , Or UDP header

SO In my point of view it is the  PROTOCOL TYPE field in IP headed says transport layer to what to do with IP . Make a TCP connection Or UDP connection.

Actually there are several protocol that don’t need TCP and UDP ports , but they have protocol number , One of the protocol is ICMP , Internet Control Protocol

Another alternative protocol is ICMP (“Internet control message protocol”). ICMP is used for error messages, and other messages intended for the TCP/IP software itself, rather than any particular user program. For example, if you attempt to connect to a host, your system may get back an ICMP message saying “host unreachable”. ICMP can also be used to find out some information about the network. See RFC 792 for details of ICMP. ICMP is similar to UDP, in that it handles messages that fit in one datagram. However it is even simpler than UDP. It doesn’t even have port numbers in its header. Since all ICMP messages are interpreted by the network software itself, no port numbers are needed to say where a ICMP message is supposed to go.

You can see the Protocol type in the IP header says “0CX 1” what this means , Meant that It is an ICMP Packet . so ICMP protocol number is 1. and there is not Port numbers for ICMP

I would like to say more about ICMP, to be conclude here what he learned so far

TCP protocol numbers is 6

UDP protocol number is  17

ICMP protocol number is 1

Ping – packet internet groper working principles is ICMP

Destination unreachable message – when the host is not reachable, physical or logical error are the causes ,

Logical error is mismatched ip addressing ,  By mistake given Broadcast IP address as the  IP address of the default gateway or any other interface.

Request time out – destination is available but the replay is not getting.

Request to server but getting request time out . it is the problem of server that can process the request. Just  ping the server.

I have to work a lote here and this document is not perfect now


What is TCP and UDP ports

•March 11, 2010 • Leave a Comment

TCP/UDP Ports Explained


Ports and how they work with IP addresses.. If you understand the concepts of IP addresses, then lets move on to TCP and UDP ports and how they work.

The devices and computers connected to the Internet use a protocol called TCP/IP to communicate with each other. When a computer in New York wants to send a piece of data to a computer in England, it must know the destination IP address that it would like to send the information to. That information is sent most often via two methods, UDP and TCP.

The two Internet workhorses: UDP and TCP

UDP? TCP? I know you are getting confused, but I promise I will explain this in very basic terms so that you can understand this concept.

TCP stands for Transmission Control Protocol. Using this method, the computer sending the data connects directly to the computer it is sending the data it to, and stay connected for the duration of the transfer. With this method, the two computers can guarantee that the data has arrived safely and correctly, and then they disconnect the connection. This method of transferring data tends to be quicker and more reliable, but puts a higher load on the computer as it has to monitor the connection and the data going across it. A real life comparison to this method would be to pick up the phone and call a friend. You have a conversation and when it is over, you both hang up, releasing the connection.

UDP stands for User Datagram Protocol. Using this method, the computer sending the data packages the information into a nice little package and releases it into the network with the hopes that it will get to the right place. What this means is that UDP does not connect directly to the receiving computer like TCP does, but rather sends the data out and relies on the devices in between the sending computer and the receiving computer to get the data where it is supposed to go properly. This method of transmission does not provide any guarantee that the data you send will ever reach its destination. On the other hand, this method of transmission has a very low overhead and is therefore very popular to use for services that are not that important to work on the first try. A comparison you can use for this method is the plain old US Postal Service. You place your mail in the mailbox and hope the Postal Service will get it to the proper location. Most of the time they do, but sometimes it gets lost along the way.

Now that you understand what TCP and UDP are, we can start discussing TCP and UDP ports in detail. Lets move on to the next section where we can describe the concept of ports better.

TCP and UDP Ports

As you know every computer or device on the Internet must have a unique number assigned to it called the IP address. This IP address is used to recognize your particular computer out of the millions of other computers connected to the Internet. When information is sent over the Internet to your computer how does your computer accept that information? It accepts that information by using TCP or UDP ports.

An easy way to understand ports is to imagine your IP address is a cable box and the ports are the different channels on that cable box. The cable company knows how to send cable to your cable box based upon a unique serial number associated with that box (IP Address), and then you receive the individual shows on different channels (Ports).

Ports work the same way. You have an IP address, and then many ports on that IP address. When I say many, I mean many. You can have a total of 65,535 TCP Ports and another 65,535 UDP ports. When a program on your computer sends or receives data over the Internet it sends that data to an ip address and a specific port on the remote computer, and receives the data on a usually random port on its own computer. If it uses the TCP protocol to send and receive the data then it will connect and bind itself to a TCP port. If it uses the UDP protocol to send and receive data, it will use a UDP port. Figure 1, below, is a representation of an IP address split into its many TCP and UDP ports. Note that once an application binds itself to a particular port, that port can not be used by any other application. It is first come, first served.

I know there are thousand’s of questions in your mind,  Okay there are several doubts in your mind.

I am sure , That’s great . We will solve it soon.