SlideShare a Scribd company logo
1TCP Port Service Multiplexer (TCPMUX)
 The specification describes a multiplexing service
that may be accessed with a network protocol to
contact any one of a number of available TCP
services of a host on a single
5 Remote Job Entry (RJE)
Remote job entry is the procedure for
sending requests for data
processing tasks or 'jobs' to mainframe
computers from remote workstations
7 ECHO
Message send protocol 18
is an application layer protocol used to send a short
message between nodes on a network.
20 FTP -- Data
The FTP protocol uses a pair of connections between
the FTP client and FTP server.
21FTP -- Control
TP servers open their machine's port 21 and listen for
incoming client connections.
22 SSH Remote Login Protocol
is a cryptographic (encrypted) network protocol to
allow remote login and other network services to
operate securely over an unsecured network.
23 Telnet
this protocol is used to establish a connection to
Transmission Control Protocol (TCP) port
number 23
25 Simple Mail Transfer Protocol (SMTP)
Simple Mail Transfer Protocol (SMTP) is an Internet
standard for electronic mail (email) transmission
29 MSG ICP
TCP ports use the Transmission Control Protocol.
UDP ports use the Datagram Protocol, a
communications protocol for the Internet network
37 Time
A host connects to a server that supports
the Time Protocol on port 37. The server then sends
the time as a 32-bit unsigned integer in binary
format
42Host Name Server (Name server)
is an obsolete network protocol used in translating
a host name to an Internet address.
43 WhoIs
is a query and response protocol that is widely used for
querying databases that store the registered users
49 Login Host Protocol (Login)
uses the Transmission Control Protocol. TCP is one of
the main protocols in TCP/IP networks.
Flagged as a virus
53 Domain Name System (DNS)
is a hierarchical distributed naming system for
computers, services, or any resource connected to
the Internet or a private network.
69Trivial File Transfer Protocol (TFTP)
Trivial File Transfer Protocol (TFTP) is a simple, lock-
step, File Transfer Protocol which allows a client to
get from or put a file onto a remote host.
70 Gopher Services
is a TCP/IP application layer protocol designed for
distributing, searching..
79 Finger
exchange of human-oriented status and user
information.
80 HTTP
is an application protocol for distributed,
collaborative, hypermedia information systems
103 X.400 Standard
X.400 is the messaging standard specified by the ITU-
TS Union
http://www.webopedia.com/quick_ref/po
rtnumbers.asp
http://searchexchange.techtarget.com/defi
nition/X400
www.wikipedia.com

More Related Content

What's hot

Fit project
Fit projectFit project
Fit project
ajay raghavender
 
Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internatUnit 4 tansport layer in the internat
Unit 4 tansport layer in the internat
Kritika Purohit
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
guest029bcd
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)
maamir farooq
 
Meeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcpMeeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcp
Syaiful Ahdan
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
Ramola Dhande
 
Protocols
Protocols Protocols
Protocols
Kopi Maheswaran
 
Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)
maamir farooq
 
Telnet
TelnetTelnet
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udprahul kundu
 
Tftp client server communication
Tftp client server communicationTftp client server communication
Tftp client server communication
Uday Sharma
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Hamidreza Bolhasani
 
TELNET Protocol
TELNET ProtocolTELNET Protocol
TELNET Protocol
Peter R. Egli
 
FTP & TFTP
FTP & TFTPFTP & TFTP
FTP & TFTP
NetProtocol Xpert
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
Online
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
Peter R. Egli
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CSThanveen
 

What's hot (20)

Fit project
Fit projectFit project
Fit project
 
Deeps
DeepsDeeps
Deeps
 
Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internatUnit 4 tansport layer in the internat
Unit 4 tansport layer in the internat
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)
 
Meeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcpMeeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcp
 
Tcp Udp
Tcp UdpTcp Udp
Tcp Udp
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Protocols
Protocols Protocols
Protocols
 
Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)
 
Ch21
Ch21Ch21
Ch21
 
Telnet
TelnetTelnet
Telnet
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
 
Tftp client server communication
Tftp client server communicationTftp client server communication
Tftp client server communication
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
 
TELNET Protocol
TELNET ProtocolTELNET Protocol
TELNET Protocol
 
FTP & TFTP
FTP & TFTPFTP & TFTP
FTP & TFTP
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CS
 

Viewers also liked

Fonts, mastheads and colour schemes
Fonts, mastheads and colour schemesFonts, mastheads and colour schemes
Fonts, mastheads and colour schemes
jakemcmann
 
Matematika semester 3 bab 2
Matematika semester 3 bab 2Matematika semester 3 bab 2
Matematika semester 3 bab 2
Muhammad Taufik
 
My porfile
My porfileMy porfile
My porfile
DenifferStyles
 
Mission statement
Mission statementMission statement
Mission statement
gruiz6
 
Presentatie anw
Presentatie anwPresentatie anw
Presentatie anw
Serge Van Haag
 
ISBR @ NHRD Showcase 2015
ISBR @ NHRD Showcase 2015ISBR @ NHRD Showcase 2015
ISBR @ NHRD Showcase 2015
Yukti Kishore
 
Exercise2 powerpoint
Exercise2 powerpointExercise2 powerpoint
Exercise2 powerpoint
Brittney Pope
 
Matematika semester 3 bab 4
Matematika semester 3 bab 4Matematika semester 3 bab 4
Matematika semester 3 bab 4
Muhammad Taufik
 
Complex Dependency Programme Overview
Complex Dependency Programme OverviewComplex Dependency Programme Overview
Complex Dependency Programme OverviewMark Grady
 
20151017
2015101720151017
20151017
kodomohome
 
Componentes de red de computadores
Componentes de red de computadoresComponentes de red de computadores
Componentes de red de computadores
Daniiel Espiinosa
 
Implementation
ImplementationImplementation
Implementation
gruiz6
 
Indian Tissue Market Outlook
Indian Tissue Market OutlookIndian Tissue Market Outlook
Indian Tissue Market OutlookPekka Niku
 
Tacrolimus article
Tacrolimus articleTacrolimus article
Tacrolimus articleAshok Thorat
 
Next steps
Next stepsNext steps
Next steps
gruiz6
 
ASAP! Lenguas Modernas - Plataforma 2015
ASAP! Lenguas Modernas - Plataforma 2015ASAP! Lenguas Modernas - Plataforma 2015
ASAP! Lenguas Modernas - Plataforma 2015
ASAPLenguasModernas
 

Viewers also liked (20)

Fonts, mastheads and colour schemes
Fonts, mastheads and colour schemesFonts, mastheads and colour schemes
Fonts, mastheads and colour schemes
 
Matematika semester 3 bab 2
Matematika semester 3 bab 2Matematika semester 3 bab 2
Matematika semester 3 bab 2
 
My porfile
My porfileMy porfile
My porfile
 
Mission statement
Mission statementMission statement
Mission statement
 
Presentatie anw
Presentatie anwPresentatie anw
Presentatie anw
 
profile of scientist
profile of scientistprofile of scientist
profile of scientist
 
ISBR @ NHRD Showcase 2015
ISBR @ NHRD Showcase 2015ISBR @ NHRD Showcase 2015
ISBR @ NHRD Showcase 2015
 
Exercise2 powerpoint
Exercise2 powerpointExercise2 powerpoint
Exercise2 powerpoint
 
Matematika semester 3 bab 4
Matematika semester 3 bab 4Matematika semester 3 bab 4
Matematika semester 3 bab 4
 
Complex Dependency Programme Overview
Complex Dependency Programme OverviewComplex Dependency Programme Overview
Complex Dependency Programme Overview
 
CV - KBI
CV - KBICV - KBI
CV - KBI
 
20151017
2015101720151017
20151017
 
Componentes de red de computadores
Componentes de red de computadoresComponentes de red de computadores
Componentes de red de computadores
 
Implementation
ImplementationImplementation
Implementation
 
Indian Tissue Market Outlook
Indian Tissue Market OutlookIndian Tissue Market Outlook
Indian Tissue Market Outlook
 
Safety cv(1)
Safety cv(1)Safety cv(1)
Safety cv(1)
 
Tacrolimus article
Tacrolimus articleTacrolimus article
Tacrolimus article
 
Optimizing Student Success
Optimizing Student SuccessOptimizing Student Success
Optimizing Student Success
 
Next steps
Next stepsNext steps
Next steps
 
ASAP! Lenguas Modernas - Plataforma 2015
ASAP! Lenguas Modernas - Plataforma 2015ASAP! Lenguas Modernas - Plataforma 2015
ASAP! Lenguas Modernas - Plataforma 2015
 

Similar to Common ports

Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
priya sehgal
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
Varinder Singh Walia
 
Ports and services
Ports and servicesPorts and services
Ports and services
Ilan Mindel
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
hoang971
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3colli03
 
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP Port
Netwax Lab
 
Networks faq
Networks faqNetworks faq
Networks faq
albertspade
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
Chandnigupta80
 
Internetbasics
InternetbasicsInternetbasics
Internetbasicspatinijava
 
Networking questions
Networking questionsNetworking questions
Networking questionsrajujast
 
Discuss the purpose of subnetting. What does CIDR stand for and me
Discuss the purpose of subnetting. What does CIDR stand for and meDiscuss the purpose of subnetting. What does CIDR stand for and me
Discuss the purpose of subnetting. What does CIDR stand for and me
huttenangela
 
protocols (1).pptx
protocols (1).pptxprotocols (1).pptx
protocols (1).pptx
ALLIPURAMLAVANYA21K9
 
Network protocals
Network protocalsNetwork protocals
Network protocals
reddivarihareesh
 
Internet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxInternet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptx
SunilNirmal9
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
Saikiran Panjala
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
Tahmina Shopna
 

Similar to Common ports (20)

Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
 
Ip
IpIp
Ip
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3
 
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP Port
 
Networks faq
Networks faqNetworks faq
Networks faq
 
Sem 1 Ch 11
Sem 1 Ch 11Sem 1 Ch 11
Sem 1 Ch 11
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Networking questions
Networking questionsNetworking questions
Networking questions
 
Discuss the purpose of subnetting. What does CIDR stand for and me
Discuss the purpose of subnetting. What does CIDR stand for and meDiscuss the purpose of subnetting. What does CIDR stand for and me
Discuss the purpose of subnetting. What does CIDR stand for and me
 
protocols (1).pptx
protocols (1).pptxprotocols (1).pptx
protocols (1).pptx
 
Rules of data transmission
Rules of data transmissionRules of data transmission
Rules of data transmission
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
TCP Section5
TCP Section5TCP Section5
TCP Section5
 
Internet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxInternet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptx
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
 

More from maryamalmarrii

Adobe software
Adobe softwareAdobe software
Adobe software
maryamalmarrii
 
Maryam almarri
Maryam almarriMaryam almarri
Maryam almarri
maryamalmarrii
 
Desktop environment
Desktop environmentDesktop environment
Desktop environment
maryamalmarrii
 
Unix philosophy and principles
Unix philosophy and principlesUnix philosophy and principles
Unix philosophy and principles
maryamalmarrii
 
Kali linux
Kali linuxKali linux
Kali linux
maryamalmarrii
 

More from maryamalmarrii (6)

Adobe software
Adobe softwareAdobe software
Adobe software
 
Maryam almarri
Maryam almarriMaryam almarri
Maryam almarri
 
Desktop environment
Desktop environmentDesktop environment
Desktop environment
 
Unix philosophy and principles
Unix philosophy and principlesUnix philosophy and principles
Unix philosophy and principles
 
Kali linux
Kali linuxKali linux
Kali linux
 
Linux
LinuxLinux
Linux
 

Recently uploaded

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

Common ports

  • 1.
  • 2. 1TCP Port Service Multiplexer (TCPMUX)  The specification describes a multiplexing service that may be accessed with a network protocol to contact any one of a number of available TCP services of a host on a single
  • 3. 5 Remote Job Entry (RJE) Remote job entry is the procedure for sending requests for data processing tasks or 'jobs' to mainframe computers from remote workstations
  • 5. Message send protocol 18 is an application layer protocol used to send a short message between nodes on a network.
  • 6. 20 FTP -- Data The FTP protocol uses a pair of connections between the FTP client and FTP server.
  • 7. 21FTP -- Control TP servers open their machine's port 21 and listen for incoming client connections.
  • 8. 22 SSH Remote Login Protocol is a cryptographic (encrypted) network protocol to allow remote login and other network services to operate securely over an unsecured network.
  • 9. 23 Telnet this protocol is used to establish a connection to Transmission Control Protocol (TCP) port number 23
  • 10. 25 Simple Mail Transfer Protocol (SMTP) Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission
  • 11. 29 MSG ICP TCP ports use the Transmission Control Protocol. UDP ports use the Datagram Protocol, a communications protocol for the Internet network
  • 12. 37 Time A host connects to a server that supports the Time Protocol on port 37. The server then sends the time as a 32-bit unsigned integer in binary format
  • 13. 42Host Name Server (Name server) is an obsolete network protocol used in translating a host name to an Internet address.
  • 14. 43 WhoIs is a query and response protocol that is widely used for querying databases that store the registered users
  • 15. 49 Login Host Protocol (Login) uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. Flagged as a virus
  • 16. 53 Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network.
  • 17. 69Trivial File Transfer Protocol (TFTP) Trivial File Transfer Protocol (TFTP) is a simple, lock- step, File Transfer Protocol which allows a client to get from or put a file onto a remote host.
  • 18. 70 Gopher Services is a TCP/IP application layer protocol designed for distributing, searching..
  • 19. 79 Finger exchange of human-oriented status and user information.
  • 20. 80 HTTP is an application protocol for distributed, collaborative, hypermedia information systems
  • 21. 103 X.400 Standard X.400 is the messaging standard specified by the ITU- TS Union