Two computers communicate over the Internet by using their IP addresses and a combination of ports. The client...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
computer (the one requesting the connection) contacts the server on a known destination port and provides the server with its own IP address and a source port that the server may use for reply traffic. All communication then takes place using those source/destination port and address combinations.
In order for the computers to communicate successfully, the server must have at least one port open to receive inbound requests. The client must then open the source port for replies from that particular system. That's simply the only way that a TCP connection can take place (UDP traffic is slightly different, but follows the same basic idea).
I suspect what the product you describe actually does is swap the client and server roles from their traditional sense. The server and client may both establish a connection to an intermediary server that routes traffic between the two. However, there's simply no way that this can be accomplished without some kind of device listening for traffic on a known port.
Dig Deeper on Network Protocols and Security
Related Q&A from Mike Chapple
The FTC was granted authority in enterprise cybersecurity regulations. Expert Mike Chapple explains what this means for organizations.continue reading
PCI DSS is pretty specific about security, but does it do enough for mobile payment security? Expert Mike Chapple explains why he says yes.continue reading
The U.S. government has been criticized for its lack of updated privacy regulations. Expert Mike Chapple advises enterprises that want to bolster ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.