SlideShare a Scribd company logo
Network Administration &
Management
Topic
Network News Transfer Protocol
Presented By
Daniyal Khan(0047)
Network News Transfer Protocol
 NNTP Stands for Network News Transfer
Protocol
 Uses a reliable stream-based transmission for the
distribution, posting and retrieval of news
articles
 It provides extra fast transmission by using less
expensive connections.
Characteristics
Privacy
Security
Reliability
Maintainability
Ease Of Use
Application Of NNTP
 Server-to-server exchanges: In this exchange, a
server requests to another server for the latest articles
or move-forward new articles to it.
 User-to-server connections: Users operate news
readers, incorporated with most Web browsers. First
user connects with a server, located at Internet service
provider, and then downloads a list of accessible
newsgroups.
Conclusion
 It is concluded, that NNTP has been confirmed a
successful protocol for exchanging ideas between
people.
 Needs improvements
 Due to tremendous growth in the field of internet a lot
of people have been demanding to find ways to use the
delivery of messages over NNTP.
 Nowadays newsgroup channels are using NNTP
protocol for the successful delivery of their news
articles.
Network Example
Network News Transfer Protocol

More Related Content

What's hot

Http protocol
Http protocolHttp protocol
Http protocol
Arpita Naik
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
Ramola Dhande
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
sonangrai
 
Presentation on dns
Presentation on dnsPresentation on dns
Presentation on dns
Anand Grewal
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CS
Thanveen
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
Rajan Pandey
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
Mohit Dhankher
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
selvakumar_b1985
 
Http-protocol
Http-protocolHttp-protocol
Http-protocol
Toushik Paul
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Web services
Web servicesWeb services
Web services
Akshay Ballarpure
 
Imap server
Imap server Imap server
Imap server
PrativaMarasini
 
DNS (Domain Name System)
DNS (Domain Name System)DNS (Domain Name System)
DNS (Domain Name System)
Shashidhara Vyakaranal
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
Shimona Agarwal
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
tmavroidis
 
Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)
shashikant pabari
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
Hema Dhariwal
 
Tcp
TcpTcp
Http request and http response
Http request and http responseHttp request and http response
Http request and http response
Nuha Noor
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
Michael Lamont
 

What's hot (20)

Http protocol
Http protocolHttp protocol
Http protocol
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Presentation on dns
Presentation on dnsPresentation on dns
Presentation on dns
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CS
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Http-protocol
Http-protocolHttp-protocol
Http-protocol
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Web services
Web servicesWeb services
Web services
 
Imap server
Imap server Imap server
Imap server
 
DNS (Domain Name System)
DNS (Domain Name System)DNS (Domain Name System)
DNS (Domain Name System)
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Tcp
TcpTcp
Tcp
 
Http request and http response
Http request and http responseHttp request and http response
Http request and http response
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 

Similar to Network News Transfer Protocol

Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
IJERD Editor
 
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYMANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEY
Editor IJMTER
 
Vpn
VpnVpn
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
OECLIB Odisha Electronics Control Library
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
HirazNor
 
WINS: Peering and IXPs
WINS: Peering and IXPsWINS: Peering and IXPs
WINS: Peering and IXPs
APNIC
 
VPN
VPNVPN
A Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityA Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and Continuity
Phearin Sok
 
My PhD thesis defense presentation
My PhD thesis defense presentationMy PhD thesis defense presentation
My PhD thesis defense presentation
Suman Srinivasan
 
Buildvpn1.pdf
Buildvpn1.pdfBuildvpn1.pdf
Buildvpn1.pdf
NarcisIlie1
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 
Private messenger
Private messengerPrivate messenger
Private messenger
Piyush Gaur
 
Network Convergence of Mobile, Broadband and Wi-Fi
Network Convergence of Mobile, Broadband and Wi-FiNetwork Convergence of Mobile, Broadband and Wi-Fi
Network Convergence of Mobile, Broadband and Wi-Fi
3G4G
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Saikiran Panjala
 
Private messenger
Private messengerPrivate messenger
Private messenger
Piyush Gaur
 
NGN Next Generation Network
NGN Next Generation NetworkNGN Next Generation Network
NGN Next Generation Network
Havar Bathaee
 
01 overview[1]r
01 overview[1]r01 overview[1]r
01 overview[1]r
Orbay Yeşil
 
IJCA
IJCAIJCA
PCTA 2018: ASNs - why is it important to cable broadband providers?
PCTA 2018: ASNs - why is it important to cable broadband providers?PCTA 2018: ASNs - why is it important to cable broadband providers?
PCTA 2018: ASNs - why is it important to cable broadband providers?
APNIC
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 

Similar to Network News Transfer Protocol (20)

Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
 
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYMANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEY
 
Vpn
VpnVpn
Vpn
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
WINS: Peering and IXPs
WINS: Peering and IXPsWINS: Peering and IXPs
WINS: Peering and IXPs
 
VPN
VPNVPN
VPN
 
A Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityA Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and Continuity
 
My PhD thesis defense presentation
My PhD thesis defense presentationMy PhD thesis defense presentation
My PhD thesis defense presentation
 
Buildvpn1.pdf
Buildvpn1.pdfBuildvpn1.pdf
Buildvpn1.pdf
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Private messenger
Private messengerPrivate messenger
Private messenger
 
Network Convergence of Mobile, Broadband and Wi-Fi
Network Convergence of Mobile, Broadband and Wi-FiNetwork Convergence of Mobile, Broadband and Wi-Fi
Network Convergence of Mobile, Broadband and Wi-Fi
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Private messenger
Private messengerPrivate messenger
Private messenger
 
NGN Next Generation Network
NGN Next Generation NetworkNGN Next Generation Network
NGN Next Generation Network
 
01 overview[1]r
01 overview[1]r01 overview[1]r
01 overview[1]r
 
IJCA
IJCAIJCA
IJCA
 
PCTA 2018: ASNs - why is it important to cable broadband providers?
PCTA 2018: ASNs - why is it important to cable broadband providers?PCTA 2018: ASNs - why is it important to cable broadband providers?
PCTA 2018: ASNs - why is it important to cable broadband providers?
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

More from Daniyal Khan

My Mechanic
My MechanicMy Mechanic
My Mechanic
Daniyal Khan
 
Windows 7 Architecture
Windows 7 ArchitectureWindows 7 Architecture
Windows 7 Architecture
Daniyal Khan
 
Risk Controlling in ISM
Risk Controlling in ISMRisk Controlling in ISM
Risk Controlling in ISM
Daniyal Khan
 
Introducing a new product in a market.
Introducing a new product in a market.Introducing a new product in a market.
Introducing a new product in a market.
Daniyal Khan
 
Honda
HondaHonda
Qualities Of A Good Leader
Qualities Of A Good LeaderQualities Of A Good Leader
Qualities Of A Good Leader
Daniyal Khan
 
Condition Statement
Condition StatementCondition Statement
Condition Statement
Daniyal Khan
 
E-mail System
E-mail SystemE-mail System
E-mail System
Daniyal Khan
 
Fiber Optics Technology
Fiber Optics TechnologyFiber Optics Technology
Fiber Optics Technology
Daniyal Khan
 

More from Daniyal Khan (9)

My Mechanic
My MechanicMy Mechanic
My Mechanic
 
Windows 7 Architecture
Windows 7 ArchitectureWindows 7 Architecture
Windows 7 Architecture
 
Risk Controlling in ISM
Risk Controlling in ISMRisk Controlling in ISM
Risk Controlling in ISM
 
Introducing a new product in a market.
Introducing a new product in a market.Introducing a new product in a market.
Introducing a new product in a market.
 
Honda
HondaHonda
Honda
 
Qualities Of A Good Leader
Qualities Of A Good LeaderQualities Of A Good Leader
Qualities Of A Good Leader
 
Condition Statement
Condition StatementCondition Statement
Condition Statement
 
E-mail System
E-mail SystemE-mail System
E-mail System
 
Fiber Optics Technology
Fiber Optics TechnologyFiber Optics Technology
Fiber Optics Technology
 

Recently uploaded

cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
Emre Gündoğdu
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
narwatsonia7
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
Federico Ast
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 

Recently uploaded (13)

cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 

Network News Transfer Protocol

  • 1.
  • 2. Network Administration & Management Topic Network News Transfer Protocol Presented By Daniyal Khan(0047)
  • 3. Network News Transfer Protocol  NNTP Stands for Network News Transfer Protocol  Uses a reliable stream-based transmission for the distribution, posting and retrieval of news articles  It provides extra fast transmission by using less expensive connections.
  • 5. Application Of NNTP  Server-to-server exchanges: In this exchange, a server requests to another server for the latest articles or move-forward new articles to it.  User-to-server connections: Users operate news readers, incorporated with most Web browsers. First user connects with a server, located at Internet service provider, and then downloads a list of accessible newsgroups.
  • 6. Conclusion  It is concluded, that NNTP has been confirmed a successful protocol for exchanging ideas between people.  Needs improvements  Due to tremendous growth in the field of internet a lot of people have been demanding to find ways to use the delivery of messages over NNTP.  Nowadays newsgroup channels are using NNTP protocol for the successful delivery of their news articles.