The TCP protocol is a core protocol of the IP suite. This protocol provides reliable error-checking of hosts communicating over an IP network. It controls the major applications that work on the internet, such as email and file transfer. However, applications that do not need data stream service uses User Datagram Protocol (UDP) (Kenworthy, 2014). UDP provides a connectionless service to the communicating parties. TCP usually need one port to support full-duplex traffic.
Internet Assignment Numbers Authority (IANA) is another protocol that maintains official assignment of port numbers (Thomas, 2010). These protocols are designed to determine what port is open to the public or not.
The firewalls have several essentials and, thus, the need for the organizations to implement them in their management systems. The first importance is that when installing and configuring firewalls in computers and the local networks, it helps significantly in preventing unwanted access to confidential information, which is mostly done by hackers (Kenworthy, 2014). The second one is that firewalls help in identifying and blocking any unwanted content. Thirdly is that firewalls help so much in handling or dealing with worms, viruses as well as the malware that affect computers and organization systems. The fourth importance is that firewalls dramatically helps the organization to have secure networks to keep their information confidential (Cooper & Guzik, 2014). This ensures that only those authorized to access the network do it, and no hacker can be able to get information from the systems of the organization. Last but not least, the firewalls have played a very significant role in organizations and individuals by assisting in keeping their private and sensitive information safe and secure from unauthorized people.