SlideShare a Scribd company logo
1 of 21
Internet Ports
Abdulla Mahmood
10BB
1TCP Port Service Multiplexer
(TCPMUX)
• The TCP Port Service Multiplexer (TCPMUX) is
a little-used Internet protocol defined in RFC
1078, this is a multicelular service.
5Remote Job Entry (RJE)
• Remote job entry is the procedure for sending
requests for data processing tasks or 'jobs'
to mainframe computers from
remote workstations, and by extension the
process of receiving the output from such
tasks at a remote workstation
7ECHO
• The Echo Protocol is a service in the Internet
Protocol Suite defined in RFC 862. It was
originally proposed for testing and
measurement of round-trip times.
18Message Send Protocol (MSP
• The Message Send Protocol (MSP), more
precisely referred to as Message Send Protocol
2, is an application layer protocol used to send
a short message between nodes on a network.
20FTP -- Data
• Is used to transfer data to other
objects/electronics.
21FTP -- Control
• Transfer protocol.
22SSH Remote Login Protocol
• Secure Shell, or SSH, is
a cryptographic (encrypted) network
protocol to allow remote login and other
network services to operate securely over an
unsecured network.
23Telnet
• Telnet is an application layer protocol used on
the Internet or local area networks to provide
a bidirectional interactive text-oriented
communication facility using a
virtual terminalconnection. User data is
interspersed in-band with Telnet control
information in an 8-bit byte oriented data
connection over the Transmission Control
Protocol (TCP).
25Simple Mail Transfer
Protocol (SMTP)
• Simple Mail Transfer Protocol (SMTP) is
an Internet standard for electronic
mail (email) transmission. First defined by RFC
821in 1982, it was last updated in 2008 with
the Extended SMTP additions by RFC 5321—
which is the protocol in widespread use today.
29MSG ICP
• UDP Port 29 may use a defined protocol to
communicate depending on the application. A
protocol is a set of formalized rules that
explains how data is communicated over a
network. Think of it as the language spoken
between computers to help them
communicate more efficiently.
37Time
• The Time Protocol is a network protocol in
the Internet Protocol Suite defined in 1983
in RFC 868 by Jon Postel and K. Harrenstein.
Its purpose is to provide a site-independent,
machine readable date and time.
42Host Name Server (Nameserv)
• the ARPA Host Name Server Protocol
(NAMESERVER[1]), is
an obsolete network protocol used in
translating a host name to an Internet address
43WhoIs
• This article is about a method for checking
information about ownership of a domain
name. For an IRC command called WHOIS
49Login Host Protocol (Login)
• Terminal Access Controller Access-Control
System (TACACS, usually pronounced like tack-
axe) refers to a family of related protocols
handling remote authentication and related
services for networked access control through a
centralized server. The original TACACS protocol,
which dates back to 1984, was used for
communicating with an authentication server,
common in older UNIX networks; it spawned
related protocols:
53Domain Name System (DNS)
• The Domain Name System (DNS) is
a hierarchical distributed naming system for
computers, services, or any resource connected to
the Internet or a private network. It associates various
information with domain names assigned to each of
the participating entities. Most prominently, it
translates domain names, which can be easily
memorized by humans, to the numerical IP
addresses needed for the purpose of computer
services and devices worldwide. The Domain Name
System is an essential component of the functionality
of most Internet services because it is the Internet's
primary directory service.
69Trivial File Transfer Protocol (TFTP)
• Trivial File Transfer Protocol (TFTP) is a
simple, lock-step, File Transfer Protocol which
allows a client to get from or put a file onto a
remote host. One of its primary uses is in the
early stages of nodes booting from a local area
network. TFTP has been used for this
application because it is very simple to
implement.
70Gopher Services
• The Gopher protocol /ˈɡoʊfər/ is
a TCP/IP application layer protocol designed for
distributing, searching, and retrieving documents
over the Internet. The Gopher protocol was
strongly oriented towards a menu-document
design and presented an alternative to theWorld
Wide Web in its early stages, but
ultimately HTTP became the dominant protocol.
The Gopher ecosystem is often regarded as the
effective predecessor of the World Wide Web.
Finger protocol
• In computer networking, the Name/Finger
protocol and the Finger user information
protocol are simple network protocols for the
exchange of human-oriented status and user
information.
80HTTP
• in Internet — TCP port 80, most often used
by Hypertext Transfer Protocol
103X.400 Standard
• X.400 is a suite of ITU-T Recommendations
that define standards for Data Communication
Networks for Message Handling Systems
(MHS) — more commonly known as email.

More Related Content

What's hot

ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
mashiur
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
mashiur
 
Next Generation Blue Z and Bluetooth Smart Drivers
Next Generation Blue Z and Bluetooth Smart DriversNext Generation Blue Z and Bluetooth Smart Drivers
Next Generation Blue Z and Bluetooth Smart Drivers
Ryo Jin
 
Networking questions
Networking questionsNetworking questions
Networking questions
rajujast
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
mashiur
 
Steen_Dissertation_March5
Steen_Dissertation_March5Steen_Dissertation_March5
Steen_Dissertation_March5
Steen Larsen
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4
Anne Starr
 

What's hot (20)

Networks faq
Networks faqNetworks faq
Networks faq
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisited
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
 
Next Generation Blue Z and Bluetooth Smart Drivers
Next Generation Blue Z and Bluetooth Smart DriversNext Generation Blue Z and Bluetooth Smart Drivers
Next Generation Blue Z and Bluetooth Smart Drivers
 
Networking questions
Networking questionsNetworking questions
Networking questions
 
6 networking
6 networking6 networking
6 networking
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
Hardware8
Hardware8Hardware8
Hardware8
 
bluetooth
bluetooth bluetooth
bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
20 Common Ports and their purposes
20 Common Ports and their purposes 20 Common Ports and their purposes
20 Common Ports and their purposes
 
Steen_Dissertation_March5
Steen_Dissertation_March5Steen_Dissertation_March5
Steen_Dissertation_March5
 
Tlc 004 - take a sip of sip
Tlc 004 - take a sip of sipTlc 004 - take a sip of sip
Tlc 004 - take a sip of sip
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4
 
Npppd: easy vpn with OpenBSD
Npppd: easy vpn with OpenBSDNpppd: easy vpn with OpenBSD
Npppd: easy vpn with OpenBSD
 
Web Presentation Week11
Web Presentation Week11Web Presentation Week11
Web Presentation Week11
 
Question 2 - 2k15 Exam Preparation Day
Question 2 - 2k15 Exam Preparation DayQuestion 2 - 2k15 Exam Preparation Day
Question 2 - 2k15 Exam Preparation Day
 

Viewers also liked

Tipos de evaluacion yeliner
Tipos de evaluacion yelinerTipos de evaluacion yeliner
Tipos de evaluacion yeliner
yelinerC
 
Personality Profile 2016
Personality Profile 2016Personality Profile 2016
Personality Profile 2016
Jim Quirk
 
Assure method assignment ci 350
Assure method assignment ci 350Assure method assignment ci 350
Assure method assignment ci 350
DB_Francisco
 
luisabianicelina
luisabianicelinaluisabianicelina
luisabianicelina
celina12
 
CAPTURING DATA PROVENANCE WITH A USER-DRIVEN FEEDBACK APPROACH
CAPTURING DATA PROVENANCE WITH A USER-DRIVEN FEEDBACK APPROACHCAPTURING DATA PROVENANCE WITH A USER-DRIVEN FEEDBACK APPROACH
CAPTURING DATA PROVENANCE WITH A USER-DRIVEN FEEDBACK APPROACH
Anusuriya Devaraju
 

Viewers also liked (15)

Mobius transformations
Mobius transformationsMobius transformations
Mobius transformations
 
Expo
ExpoExpo
Expo
 
Mae_nilsa
Mae_nilsaMae_nilsa
Mae_nilsa
 
Presentación1
Presentación1Presentación1
Presentación1
 
Tipos de evaluacion yeliner
Tipos de evaluacion yelinerTipos de evaluacion yeliner
Tipos de evaluacion yeliner
 
San Antonio Book Unveiling 2008
San Antonio Book Unveiling 2008San Antonio Book Unveiling 2008
San Antonio Book Unveiling 2008
 
Personality Profile 2016
Personality Profile 2016Personality Profile 2016
Personality Profile 2016
 
The tale of the tail about markets, on-farm diversity and diets in rural hous...
The tale of the tail about markets, on-farm diversity and diets in rural hous...The tale of the tail about markets, on-farm diversity and diets in rural hous...
The tale of the tail about markets, on-farm diversity and diets in rural hous...
 
gilda
gildagilda
gilda
 
Assure method assignment ci 350
Assure method assignment ci 350Assure method assignment ci 350
Assure method assignment ci 350
 
Curriculum Jean Fung
Curriculum Jean FungCurriculum Jean Fung
Curriculum Jean Fung
 
luisabianicelina
luisabianicelinaluisabianicelina
luisabianicelina
 
CAPTURING DATA PROVENANCE WITH A USER-DRIVEN FEEDBACK APPROACH
CAPTURING DATA PROVENANCE WITH A USER-DRIVEN FEEDBACK APPROACHCAPTURING DATA PROVENANCE WITH A USER-DRIVEN FEEDBACK APPROACH
CAPTURING DATA PROVENANCE WITH A USER-DRIVEN FEEDBACK APPROACH
 
Classes d´enunciats
Classes d´enunciatsClasses d´enunciats
Classes d´enunciats
 
Vizkelety József - Évről évre növekvő mennyiség
Vizkelety József - Évről évre növekvő mennyiségVizkelety József - Évről évre növekvő mennyiség
Vizkelety József - Évről évre növekvő mennyiség
 

Similar to Internet ports abduilla

Computer Networks
Computer NetworksComputer Networks
Computer Networks
Shylesh BC
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3
colli03
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
anjaniar7gallery
 

Similar to Internet ports abduilla (20)

Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
 
Internet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxInternet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptx
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Networking based ppt
Networking based pptNetworking based ppt
Networking based ppt
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Ip
IpIp
Ip
 
Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer science
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3
 
A Presentation on Servers & Splunk
A Presentation on Servers & SplunkA Presentation on Servers & Splunk
A Presentation on Servers & Splunk
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Deeps
DeepsDeeps
Deeps
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 

Recently uploaded

VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 

Recently uploaded (20)

Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 

Internet ports abduilla

  • 2. 1TCP Port Service Multiplexer (TCPMUX) • The TCP Port Service Multiplexer (TCPMUX) is a little-used Internet protocol defined in RFC 1078, this is a multicelular service.
  • 3. 5Remote Job Entry (RJE) • Remote job entry is the procedure for sending requests for data processing tasks or 'jobs' to mainframe computers from remote workstations, and by extension the process of receiving the output from such tasks at a remote workstation
  • 4. 7ECHO • The Echo Protocol is a service in the Internet Protocol Suite defined in RFC 862. It was originally proposed for testing and measurement of round-trip times.
  • 5. 18Message Send Protocol (MSP • The Message Send Protocol (MSP), more precisely referred to as Message Send Protocol 2, is an application layer protocol used to send a short message between nodes on a network.
  • 6. 20FTP -- Data • Is used to transfer data to other objects/electronics.
  • 7. 21FTP -- Control • Transfer protocol.
  • 8. 22SSH Remote Login Protocol • Secure Shell, or SSH, is a cryptographic (encrypted) network protocol to allow remote login and other network services to operate securely over an unsecured network.
  • 9. 23Telnet • Telnet is an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminalconnection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP).
  • 10. 25Simple Mail Transfer Protocol (SMTP) • Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission. First defined by RFC 821in 1982, it was last updated in 2008 with the Extended SMTP additions by RFC 5321— which is the protocol in widespread use today.
  • 11. 29MSG ICP • UDP Port 29 may use a defined protocol to communicate depending on the application. A protocol is a set of formalized rules that explains how data is communicated over a network. Think of it as the language spoken between computers to help them communicate more efficiently.
  • 12. 37Time • The Time Protocol is a network protocol in the Internet Protocol Suite defined in 1983 in RFC 868 by Jon Postel and K. Harrenstein. Its purpose is to provide a site-independent, machine readable date and time.
  • 13. 42Host Name Server (Nameserv) • the ARPA Host Name Server Protocol (NAMESERVER[1]), is an obsolete network protocol used in translating a host name to an Internet address
  • 14. 43WhoIs • This article is about a method for checking information about ownership of a domain name. For an IRC command called WHOIS
  • 15. 49Login Host Protocol (Login) • Terminal Access Controller Access-Control System (TACACS, usually pronounced like tack- axe) refers to a family of related protocols handling remote authentication and related services for networked access control through a centralized server. The original TACACS protocol, which dates back to 1984, was used for communicating with an authentication server, common in older UNIX networks; it spawned related protocols:
  • 16. 53Domain Name System (DNS) • The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates domain names, which can be easily memorized by humans, to the numerical IP addresses needed for the purpose of computer services and devices worldwide. The Domain Name System is an essential component of the functionality of most Internet services because it is the Internet's primary directory service.
  • 17. 69Trivial File Transfer Protocol (TFTP) • Trivial File Transfer Protocol (TFTP) is a simple, lock-step, File Transfer Protocol which allows a client to get from or put a file onto a remote host. One of its primary uses is in the early stages of nodes booting from a local area network. TFTP has been used for this application because it is very simple to implement.
  • 18. 70Gopher Services • The Gopher protocol /ˈɡoʊfər/ is a TCP/IP application layer protocol designed for distributing, searching, and retrieving documents over the Internet. The Gopher protocol was strongly oriented towards a menu-document design and presented an alternative to theWorld Wide Web in its early stages, but ultimately HTTP became the dominant protocol. The Gopher ecosystem is often regarded as the effective predecessor of the World Wide Web.
  • 19. Finger protocol • In computer networking, the Name/Finger protocol and the Finger user information protocol are simple network protocols for the exchange of human-oriented status and user information.
  • 20. 80HTTP • in Internet — TCP port 80, most often used by Hypertext Transfer Protocol
  • 21. 103X.400 Standard • X.400 is a suite of ITU-T Recommendations that define standards for Data Communication Networks for Message Handling Systems (MHS) — more commonly known as email.