<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>handbook,.</title><description></description><managingEditor>noreply@blogger.com (fakrule bromo)</managingEditor><pubDate>Fri, 1 Nov 2024 03:41:21 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">8</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://mowewe.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Surf in marocco,..</title><link>http://mowewe.blogspot.com/2009/07/surf-in-marocco.html</link><category>you hobby</category><author>noreply@blogger.com (fakrule bromo)</author><pubDate>Fri, 24 Jul 2009 00:30:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2364300410027338874.post-3199833635936124170</guid><description>&lt;div style="text-align: justify;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2ttt86iXSEbqpqB5AmC8_9udMdfIBbCjRZAEaMsOZRxTW8mnctolKwQBwe9e-C9vYXFEwzlSt7gKwLZSzr-7zYpZnVXZkcFgXXGsLwgMxLwRZd62Fos_xGdNPsnsQrFvsJwDMGDWcdcY/s1600-h/morocco_surf_sun_beaches159.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 213px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2ttt86iXSEbqpqB5AmC8_9udMdfIBbCjRZAEaMsOZRxTW8mnctolKwQBwe9e-C9vYXFEwzlSt7gKwLZSzr-7zYpZnVXZkcFgXXGsLwgMxLwRZd62Fos_xGdNPsnsQrFvsJwDMGDWcdcY/s320/morocco_surf_sun_beaches159.jpg" alt="" id="BLOGGER_PHOTO_ID_5361931848691165202" border="0" /&gt;&lt;/a&gt;Morocco? There's no surf in marocco! Really? Check again! Just because the name is not on the surf map, doesn't mean they can't throw a serous 46ft right-hander (even if you gotta face the snake charmer first). And the would be the reason why this flick by pete matthew is titled "Under The Radar". Starting from morocco point break with Mikala Jones, Josh Mulcoy, we then take a big leap to the latest newly discovered surf destination: Mentawai, with a serious session featuring Indo's big guns like Rizal Tanjung, Bol, and Wayan "betet" Merta before cruising back to South Africa to see what Kelly slater can do on 2ft surf. Nice side imagery too, When women in Burkhas in Marocco markets to the hectic back streets of Kuta.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7AZFQB1v7nAOF3mq3QbeArjU0TPdlAIGAE7rsAN_hUcbqUJQkSd6AAOf_K0lPADwsIHjW4zVdvBs4uGaF551EKz5avkbMTAztgHe3nY-mJVgJeI16LMMZmzylK7zAUCwWIoEW0YXlTZk/s1600-h/SE-safi-6.jpg"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 288px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7AZFQB1v7nAOF3mq3QbeArjU0TPdlAIGAE7rsAN_hUcbqUJQkSd6AAOf_K0lPADwsIHjW4zVdvBs4uGaF551EKz5avkbMTAztgHe3nY-mJVgJeI16LMMZmzylK7zAUCwWIoEW0YXlTZk/s320/SE-safi-6.jpg" alt="" id="BLOGGER_PHOTO_ID_5361931491178666514" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;Two different sides of the world fused into an enjoyable surf movie. At least this will help you quench your thirst for riding some waves - something difficult to find with all this crappy weather lately.&lt;br /&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2ttt86iXSEbqpqB5AmC8_9udMdfIBbCjRZAEaMsOZRxTW8mnctolKwQBwe9e-C9vYXFEwzlSt7gKwLZSzr-7zYpZnVXZkcFgXXGsLwgMxLwRZd62Fos_xGdNPsnsQrFvsJwDMGDWcdcY/s72-c/morocco_surf_sun_beaches159.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>EasyHotspot,..</title><link>http://mowewe.blogspot.com/2009/07/easyhotspot.html</link><category>network handbook</category><author>noreply@blogger.com (fakrule bromo)</author><pubDate>Mon, 20 Jul 2009 22:13:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2364300410027338874.post-3714211993243491088</guid><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyL9nx1GEjVrOrcj1sx2nTXdssO8A7OEUc16nobYoYGQ_Myo93NAuF8L64pwDCPXZtXOStF_fAIFxtgJtWMHIQMm3xXZrNWw_NejwtEddf-H7kLZbm-gssnZeKI7bRmiWs3Hy_zsL5PuI/s1600-h/4642588Scheme_EasyHotspot.jpg"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 300px; height: 290px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyL9nx1GEjVrOrcj1sx2nTXdssO8A7OEUc16nobYoYGQ_Myo93NAuF8L64pwDCPXZtXOStF_fAIFxtgJtWMHIQMm3xXZrNWw_NejwtEddf-H7kLZbm-gssnZeKI7bRmiWs3Hy_zsL5PuI/s320/4642588Scheme_EasyHotspot.jpg" alt="" id="BLOGGER_PHOTO_ID_5360780489933851842" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;1. Overview&lt;br /&gt;&lt;/div&gt;EasyHotspot is a hotspot billing system, based on OpenSource Technology. EasyHotspot use&lt;br /&gt;Linux as it's operating system, FreeRadius as RADIUS server and PHP MySQL APACHE&lt;br /&gt;  trio  for LAMP architecture.&lt;br /&gt;EasyHotspot providing pre-configured billing system with web based administration that&lt;br /&gt;readily get action with very minimum effort.&lt;br /&gt;2. Hardware Recruitments&lt;br /&gt;To build a hotspot system using EasyHotspot, you need :&lt;br /&gt;1. PC with minimal spec :&lt;br /&gt;■ Pentium 3 or equal&lt;br /&gt;■ 256 MB RAM&lt;br /&gt;■ 5 GB Free Space HDD&lt;br /&gt;■ 2 network interface (LAN CARD)&lt;br /&gt;■ 1 Wireless Access Point(you don't need wireless router feature but a Wireless AP)&lt;br /&gt;■ Switch/Hub (optional, only for wired user)&lt;br /&gt;3. Installing EasyHotspot&lt;br /&gt;Installing Easyhotspot is easy, just boot up your PC using EasyHotspot CD, and then follow the&lt;br /&gt;instructions. Since EasyHotspot using Xubuntu distro, you can see the installation details at&lt;br /&gt;Xubuntu Documentation.&lt;br /&gt;4. Configuring EasyHotspot&lt;br /&gt;1. Editing Company Info&lt;br /&gt;Easyhotspot Comes with Company Info editable feature. To edit the company info, please&lt;br /&gt;edit the /var/www/system/application/config/easyhotspot.php . Edit the entries according to&lt;br /&gt;your real condition.&lt;br /&gt;2. Setting Language&lt;br /&gt;For now EasyHotspot only support two language (English and Bahasa), you could add your&lt;br /&gt;language by helping us translate it to another language (please send your email to me).&lt;br /&gt;edit the /var/www/system/application/config/config.php&lt;br /&gt;$config['language'] = "english";&lt;br /&gt;3. Setting Homepage&lt;br /&gt;By default, EasyHotspot is only accessible from the server itself (localhost), if you want to&lt;br /&gt;remote your billing system you could tell EasyHotspot to change the homepage from&lt;br /&gt;locahost to your accessible IP Address.&lt;br /&gt;Edit /var/www/system/application/config/config.php, find $config['base_url'] line.&lt;br /&gt;example :&lt;br /&gt;$config['base_url'] = "http://192.168.182.1/";&lt;br /&gt;192.168.182.1 is your EasyHotspot IP address4. Patching (version 0.1 only)&lt;br /&gt;Some people noticed that EasyHotspot is not disconnected expired users when they reached&lt;br /&gt;their limit (packet/octet based). It's happenned because FreeRadius didn't know what to do if&lt;br /&gt;they reached their limit.&lt;br /&gt;Actually there is some instructions written in FreeRadius configuration file, but somehow I&lt;br /&gt;forgot to enable it. To fix it just enable the instructions and save it. This is how to do it:&lt;br /&gt;edit /etc/freeradius/radiusd.conf file and remove # mark on line&lt;br /&gt;5. Setting Your Network&lt;br /&gt;Make sure that you have two interface named eth0 and eth1, if you have eth2, eth3 and so&lt;br /&gt;on please consult the troubleshoot section.&lt;br /&gt;1. internet&lt;br /&gt;Set your eth0 as your internet connection source. It can be dynamic or static. If you have&lt;br /&gt;a dynamic connection, just simply plug in the ethernet cable to eth0 interface, or if you&lt;br /&gt;have a static connection you can configure it by clicking the network icon on system&lt;br /&gt;tray and hit manual configuration.&lt;br /&gt;2. distribution area&lt;br /&gt;eth1 will act as distribution interface. You don't have to configure this interface at all.&lt;br /&gt;Just connect to AP or Switch hub and then let your client connect . Make sure that you&lt;br /&gt;have disabled DHCP, Encryption, and Router feature in your hotspot (if exist).&lt;br /&gt;5. Using EasyHotspot&lt;br /&gt;EasyHotspot comes with preconfigured hotspot system and a web interface to manage all stuffs&lt;br /&gt;that related to bililng activity, such as account generation, invoice, billing plan, etc.&lt;br /&gt;Actor in EasyHotspot web interface consist into :&lt;br /&gt;■ admin : this user handle billing plan, price and system configuration.&lt;br /&gt;■ cashier : this user handle business area, user generation, invoice, view stats&lt;br /&gt;Admin Activity :&lt;br /&gt;All of admin activity needs admin level permission.&lt;br /&gt;1. Creating BillingPlan&lt;br /&gt;BillingPlan is like a   template  for your voucher. What kind of voucher you want to&lt;br /&gt;generate ? The billing you have created then will be used by the cashier to generate the&lt;br /&gt;vouchers.&lt;br /&gt;2. Setting PostPaid Price&lt;br /&gt;3. Managing cashier account&lt;br /&gt;You can assign/add/edit/delete other people to be a cashier&lt;br /&gt;Cashier Activity :&lt;br /&gt;4. Generate Voucher&lt;br /&gt;Voucher is a prepaid billing system. Voucher could be generated from BillingPlan that&lt;br /&gt;admin have created before. Usually this method used by Cafe, Mall or any other place that&lt;br /&gt;people usually mobile.&lt;br /&gt;5. Postpaid account&lt;br /&gt;Postpaid account is a postpaid billing system. The first step to use this feature, the cashiers&lt;br /&gt;have to create postpaid user, print the voucher and then give it to clients. If the clients&lt;br /&gt;decide to stop, the cashier will close and print invoice by clicking the detail of clients usage.&lt;br /&gt;If the account closed this account would never be used again&lt;br /&gt;6. Important things for your customers :&lt;br /&gt;1. How to Connect the AP / Wired network&lt;br /&gt;Connect your clients by choosing your AP or Switch, in this step EasyHotspot will give&lt;br /&gt;your clients an IP Address.&lt;br /&gt;2. How to log in using printed voucher&lt;br /&gt;To login you need to open the browser and surf to the internet, before you see the page,&lt;br /&gt;you will be prompted to a login page (accept all certificate before).&lt;br /&gt;Enter user name and password that printed on your voucher. Enjoy your surfing =)&lt;br /&gt;3. How to logout&lt;br /&gt;Simply click logout and you will logged out. If you accidentally close the browser,&lt;br /&gt;navigate to : http://192.168.182.1:9220/prelogin&lt;br /&gt;6. Tips&lt;br /&gt;1. Changing interface name&lt;br /&gt;I highly recommend you to make sure that you have 2 interface named eth0 and eth1. eth0&lt;br /&gt;will be act as an internet line and eth1 as a distribution interface. If your interfaces name are&lt;br /&gt;not eth0 and eth1 you should change it.&lt;br /&gt;This is how to do it :&lt;br /&gt;edit the /etc/udev/rules.d/70-persistent-net.rules file&lt;br /&gt;example :&lt;br /&gt;from&lt;br /&gt;SUBSYSTEM=="net", DRIVERS=="?*",&lt;br /&gt;ATTRS{address}=="00:16:d3:5e:8f:f3", NAME="eth3" # PCI device&lt;br /&gt;0x14e4:0x4311 (bcm43xx) SUBSYSTEM=="net", DRIVERS=="?*",&lt;br /&gt;ATTRS{address}=="00:19:7e:a5:45:84", NAME="eth4"&lt;br /&gt;to&lt;br /&gt;SUBSYSTEM=="net", DRIVERS=="?*", ATTRS{address}=="00:16:d3:5e:&lt;br /&gt;8f:f3", NAME="eth0"&lt;br /&gt;# PCI device 0x14e4:0x4311 (bcm43xx)&lt;br /&gt;SUBSYSTEM=="net", DRIVERS=="?*",&lt;br /&gt;ATTRS{address}=="00:19:7e:a5:45:84", NAME="eth1"&lt;br /&gt;2. Changing MySQL default password&lt;br /&gt;It would be better to change the default root and easyhotspot user password. You can search&lt;br /&gt;the details of how doing that at mysql documentation. After that don't forget to edit the /var/www/system/application/config/database.php</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyL9nx1GEjVrOrcj1sx2nTXdssO8A7OEUc16nobYoYGQ_Myo93NAuF8L64pwDCPXZtXOStF_fAIFxtgJtWMHIQMm3xXZrNWw_NejwtEddf-H7kLZbm-gssnZeKI7bRmiWs3Hy_zsL5PuI/s72-c/4642588Scheme_EasyHotspot.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Network Security Technologies and Protocols</title><link>http://mowewe.blogspot.com/2009/07/network-security-technologies-and.html</link><category>network handbook</category><author>noreply@blogger.com (fakrule bromo)</author><pubDate>Tue, 14 Jul 2009 07:41:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2364300410027338874.post-3823846704586623140</guid><description>&lt;blockquote&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;Description&lt;/b&gt;&lt;a name="Network security"&gt;&lt;/a&gt; Network  security covers such issues as network communication privacy, information  confidentiality and integrity over network, controlled access to restricted  network domains and sensitive information, and using the public network such as  Internet for private communications. To address these issues, various network  and information security technologies have been developed by various  organizations and technology vendors. Here is a summary of the technologies:  &lt;/p&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="is a"&gt;&lt;/a&gt;AAA: Authorization, Authentication and  Accounting is a technology for intelligently controlling access to network  resources, enforcing policies, auditing usage, and providing the information  necessary to bill for services. Authentication provides a way of identifying a  user, typically by having the user enter a valid user name and valid password  before access is granted. The authorization process determines whether the user  has the authority to access certain information or some network sub-domains.  Accounting measures the resources a user consumes while using the network, which  includes the amount of system time or the amount of data a user has sent and/or  received during a session, which could be used for authorization control,  billing, trend analysis, resource utilization, and capacity planning activities.  A dedicated AAA server or a program that performs these functions often provides  authentication, authorization, and accounting services. &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="is a"&gt;&lt;/a&gt;VPN: Virtual Private Network is a technology  allowing private communications by business and individuals, such as remote  access to a corporate network or using a public telecommunication  infrastructure, such as the Internet. A virtual private network can also be a  specially configured network over the public network infrastructure that is only  used by one organization. Various network-tunneling technologies such as L2TP  have been developed to reach this goal. Using encryption technologies such as  IPsec could further enhance information privacy over network and virtual private  networks. &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="a software"&gt;&lt;/a&gt;Firewall: Firewall is a software  program or hardware device that filters the information coming through the  Internet connection into a private network or computer system. Firewalls use one  or more of three methods to control traffic flowing in and out the network: &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt; &lt;/p&gt;&lt;ul style="text-align: justify;"&gt;&lt;li&gt; &lt;p class="docList"&gt;&lt;a name="are analyzed"&gt;&lt;/a&gt;Packet filtering - Packets are  analyzed against a set of filters. Packets that make it through the filters are  sent to the requesting system and all others are discarded. &lt;/p&gt; &lt;/li&gt;&lt;li&gt; &lt;p class="docList"&gt;&lt;a name="firewall and"&gt;&lt;/a&gt;Proxy service - Information from the  Internet is retrieved by the firewall and then sent to the requesting system and  vice versa. &lt;/p&gt; &lt;/li&gt;&lt;li&gt; &lt;p class="docList"&gt;&lt;a name="packets passing"&gt;&lt;/a&gt;Stateful inspection - compares  certain key parts of packets passing through with a database of trusted  information. Outgoing information from inside the firewall is monitored for  specific defining characteristics, and incoming information is then compared  with these characteristics. If the comparison yields a reasonable match, the  information is allowed through. Otherwise it is discarded. &lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;   &lt;p class="docText"&gt;&lt;b&gt;Protocols&lt;/b&gt;&lt;a name="AAA and"&gt;&lt;/a&gt; The key protocols for  AAA and VPN:  &lt;/p&gt;&lt;p class="docText"&gt;&lt;a name="par03tb01"&gt;&lt;/a&gt; &lt;/p&gt;&lt;p&gt; &lt;table style="width: 611px; height: 606px;" class="allBorders" border="1" cellspacing="0"&gt; &lt;colgroup align="middle" span="2"&gt; &lt;col width="250"&gt; &lt;col width="250"&gt;&lt;/colgroup&gt; &lt;thead&gt;&lt;/thead&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td class="docTableCell" rowspan="4" align="middle"&gt;Authentication Authorization  Accounting&lt;/td&gt; &lt;td class="docTableCell" align="middle"&gt;Kerberos: Network Authentication  Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;RADIUS: Remote Authentication Dial In User  Service&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;SSH: Secure Shell Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;TACACS: Terminal Access Controller Access  Control Protocol (and TACACS+)&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" rowspan="3" align="middle"&gt;Tunneling&lt;/td&gt; &lt;td class="docTableCell" align="middle"&gt;L2F: Level 2 Forwarding protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;L2TP: Layer 2 Tunneling Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;PPTP: Point to Point Tunneling  Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" rowspan="8" align="middle"&gt;Secured Routing&lt;/td&gt; &lt;td class="docTableCell" align="middle"&gt;DiffServ: Differentiated Service&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;GRE: Generic Routing Encapsulation&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;IPsec: Security Architecture for IP  network&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;IPsec AH: IPsec Authentication  Header&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;IPsec ESP: IPsecEncapsulating Security  Payload&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;IPsec IKE: Internet Key Exchange  Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;IPsec ISAKMP: Internet Security Association  and Key Management Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;TLS: Transport Layer Security  Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;Others&lt;/td&gt; &lt;td class="docTableCell" align="middle"&gt;Socks: Protocol for sessions traversal  across firewall securely&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/p&gt;&lt;br /&gt;  &lt;p class="docText"&gt;&lt;b&gt;Reference&lt;/b&gt; &lt;/p&gt;&lt;pre&gt;&lt;a class="docLink" href="http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/security.htm" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/security.htm&lt;/a&gt;&lt;br /&gt;Securities Technologies&lt;br /&gt;&lt;/pre&gt; &lt;/blockquote&gt; &lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Voice over IP and VOIP Protocols</title><link>http://mowewe.blogspot.com/2009/07/voice-over-ip-and-voip-protocols.html</link><category>network handbook</category><author>noreply@blogger.com (fakrule bromo)</author><pubDate>Tue, 14 Jul 2009 07:37:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2364300410027338874.post-4060581824826653822</guid><description>&lt;blockquote&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;Description&lt;/b&gt;&lt;a name="Voice over"&gt;&lt;/a&gt; Voice over IP  (VOIP) uses the Internet Protocol (IP) to transmit voice as packets over an IP  network. Using VOIP protocols, voice communications can be achieved on any IP  network regardless whether it is Internet, Intranet or Local Area Networks  (LAN). In a VOIP enabled network, the voice signal is digitized, compressed and  converted to IP packets and then transmitted over the IP network. VOIP signaling  protocols are used to set up and tear down calls, carry information required to  locate users and negotiate capabilities. The key benefits of Internet telephony  (Voice over IP) are the very low cost, the integration of data, voice and video  on one network, the new services created on the converged network and simplified  management of end user and terminals.  &lt;/p&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="few VOIP"&gt;&lt;/a&gt;There are a few VOIP protocol stacks  which are derived by various standard bodies and vendors, namely H.323, SIP,  MEGACO and MGCP. &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="was originally"&gt;&lt;/a&gt;H.323 is the ITU-T's standard,  which was originally developed for multimedia conferencing on LANs, but was  later extended to cover Voice over IP. The standard encompasses both point to  point communications and multipoint conferences. H.323 defines four logical  components: Terminals, Gateways, Gatekeepers and Multipoint Control Units  (MCUs). Terminals, gateways and MCUs are known as endpoints. &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="Protocol"&gt;&lt;/a&gt;Session Initiation Protocol (SIP) is the  IETF's standard for establishing VOIP connections. SIP is an application layer  control protocol for creating, modifying and terminating sessions with one or  more participants. The architecture of SIP is similar to that of HTTP  (client-server protocol). Requests are generated by the client and sent to the  server. The server processes the requests and then sends a response to the  client. A request and the responses for that request make a transaction. &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="Protocol"&gt;&lt;/a&gt;Media Gateway Control Protocol (MGCP), an  IETF standard based on Cisco and Telcordia proposals, defines communication  between call control elements (Call Agents or Media Gateway) and telephony  gateways. MGCP is a control protocol, allowing a central coordinator to monitor  events in IP phones and gateways and instruct them to send media to specific  addresses. In the MGCP architecture, the call control intelligence is located  outside the gateways and is handled by the call control elements (the Call  Agent). Also, the call control elements (Call Agents) will synchronize with each  other to send coherent commands to the gateways under their control. CableLab  has adopted the MGCP for its PacketCable embbed clients in VOIP applications and  the resulted protocol is called Network Based Signaling Protocol (NCS). &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="efforts of"&gt;&lt;/a&gt;The Media Gateway Control Protocol  (Megaco) is a result of joint efforts of the IETF and the ITU-T (ITU-T  Recommendation H.248). Megaco/H.248 is a protocol for the control of elements in  a physically decomposed multimedia gateway, which enables separation of call  control from media conversion. Megaco/H.248 addresses the relationship between  the Media Gateway (MG), which converts circuit-switched voice to packet-based  traffic, and the Media Gateway Controller, which dictates the service logic of  that traffic. Megaco/H.248 instructs an MG to connect streams coming from  outside a packet or cell data network onto a packet or cell stream such as the  Real-Time Transport Protocol (RTP). Megaco/H.248 is essentially quite similar to  MGCP from an architectural standpoint and the controller-to-gateway  relationship, but Megaco/H.248 supports a broader range of networks. &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="the circuit"&gt;&lt;/a&gt;The SS7/C7 is the traditional  signaling protocol for the circuit switched voice networks. To integrate the  SS7/C7 network with the IP network, a group of protocols are defined, namely  SIGTRAN (Signaling Transpor protocol). The key transport protocol in the SIGTRAN  stack, the Stream Control Transmission Protocol (SCTP), has been applied in a  much broader base after its creation. &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="the VOIP"&gt;&lt;/a&gt;In the past few years, the VOIP industry  has been working on addressing the following key issues: &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="does not"&gt;&lt;/a&gt;Quality of voice -- As IP was  designed for carrying data, it does not provide real time guarantees but only  provides best effort service. For voice communications over IP to become  acceptable to users, the packet delay and getter needs to be less than a  threshold value. &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="Interoperability"&gt;&lt;/a&gt;Interoperability -- In a public  network environment, products from different vendors need to operate with each  other for Voice over IP to become common among users. &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="and tunneling"&gt;&lt;/a&gt;Security -- Encryption (such as  SSL) and tunneling (L2TP) technologies have been developed to protect VOIP  signaling and bear traffic. &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="Switched Telephone"&gt;&lt;/a&gt;Integration with Public  Switched Telephone Network(PSTN) -- While Internet telephony is being  introduced, it will need to work in conjunction with PSTN in the foreseeable  future. Gateway technologies are being developed to bridge the two networks.  &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="systems need"&gt;&lt;/a&gt;Scalability -- VOIP systems need to  be flexible enough to grow to the large user market for both private and public  services. Many network management and user management technologies and products  are being developed to address the issue. &lt;/p&gt;  &lt;p class="docText"&gt;&lt;b&gt;Key VOIP Protocols&lt;/b&gt; &lt;a name="par04tb01"&gt;&lt;/a&gt; &lt;/p&gt;&lt;p&gt; &lt;table style="width: 613px; height: 943px;" class="allBorders" border="1" cellspacing="0"&gt; &lt;colgroup align="left" span="2"&gt; &lt;col width="250"&gt; &lt;col width="250"&gt;&lt;/colgroup&gt; &lt;thead&gt;&lt;/thead&gt; &lt;tbody&gt; &lt;tr align="left"&gt; &lt;td class="docTableCell" colspan="2"&gt;                              Signaling&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td style="text-align: center;" class="docTableCell" rowspan="5"&gt;ITU-T H.323&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;H.323: Packet-based multimedia communications  (VoIP) architecture&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;&lt;a name="RAS in"&gt;&lt;/a&gt;H.225: Call Signaling and  RAS in H.323 VOIP Architecture&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;H.235: Security for H.323 based systems and  communications&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;H.245: Control Protocol for Multimedia  Communication&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;T.120: Multipoint Data Conferencing Protocol  Suite&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td style="text-align: center;" class="docTableCell" rowspan="6"&gt;IETF&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Megaco / H.248: Media Gateway Control  protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;MGCP: Media Gateway Control Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;RTSP: Real Time Streaming Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;SIP: Session Initiation Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;SDP: Session Description Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;SAP: Session Announcement Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td style="text-align: center;" class="docTableCell"&gt;CableLab&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;NCS: Netowrk-based Call Signaling  Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td style="text-align: center;" class="docTableCell"&gt;Cisco Skinny&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;SCCP: Skinny Client Control Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td style="text-align: center;" class="docTableCell" rowspan="6"&gt;Media/CODEC&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;G.7xx: Audio (Voice) Compression Protocols  (G.711, G.721, G.722, G.723, G.726, G.727. G.728, G.729)&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;H.261: Video CODEC for Low Quality  Videoconferencing&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;H.263: Video CODEC for Medium Quality  Videoconferencing&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;H.264 / MPEG-4: Video CODEC for High Quality  Video Streaming&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;Video CODEC for Medium Quality  VideoconferencingRTP: Real Time Transport Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;RTCP: RTP Control Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td style="text-align: center;" class="docTableCell" rowspan="4"&gt;Others&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;COPS: Common Open Policy Service&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;SIGTRAN: Signaling Transport protocol stack  for SS7/C7 over IP&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;SCTP: Stream Control Transmission  Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;TRIP: Telephony Routing Over  IP&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/p&gt;&lt;br /&gt; &lt;p class="docText"&gt;&lt;b&gt;Sponsor Source&lt;/b&gt; VOIP protocols are defined by IETF, ITU-T  and some vendors. &lt;/p&gt; &lt;p class="docText"&gt;&lt;b&gt;Reference&lt;/b&gt; &lt;/p&gt;&lt;pre&gt;&lt;a class="docLink" href="http://www.cis.ohio-state.edu/%7Ejain/refs/ref_voip.htm" target="_blank"&gt;http://www.cis.ohio-state.edu/~jain/refs/ref_voip.htm&lt;/a&gt;&lt;br /&gt;Voice Over IP and IP Telephony References&lt;br /&gt;&lt;/pre&gt; &lt;/blockquote&gt; &lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Cisco Protocols</title><link>http://mowewe.blogspot.com/2009/07/cisco-protocols.html</link><category>network handbook</category><author>noreply@blogger.com (fakrule bromo)</author><pubDate>Tue, 14 Jul 2009 07:32:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2364300410027338874.post-9049344032997719260</guid><description>&lt;blockquote&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;Description&lt;/b&gt;&lt;a name="Cisco Systems"&gt;&lt;/a&gt; Cisco Systems  plays an active role in the IETF committees to bring Cisco technology  initiatives into the standards track. At the same time, Cisco created many  proprietary protocols, which are mostly included in the IOS, the operating  system of Cisco products. In this book, we have selected the most frequently  used Cisco protocols to introduce.  &lt;/p&gt;&lt;pre&gt;CDP: Cisco Discovery Protocol&lt;br /&gt;CGMP: Cisco Group Management Protocol&lt;br /&gt;DISL: Dynamic Inter-Switch Link Protocol&lt;br /&gt;DTP: Cisco Dynamic Trunking Protocol&lt;br /&gt;EIGRP: Enhanced Interior Gateway Routing Protocol&lt;br /&gt;HSRP: Hot Standby Router Protocol&lt;br /&gt;IGRP: Interior Gateway Routing Protocol&lt;br /&gt;ISL: Cisco Inter-Switch Link Protocol&lt;br /&gt;NetFlow: Cisco traffic mamagement protocol&lt;br /&gt;RGMP: Cisco Router Port Group Management Protocol&lt;br /&gt;TACACS and TACACS+: Terminal Access Controller Access Control Protocol&lt;br /&gt;VTP: Cisco VLAN Trunking Protocol&lt;br /&gt;XOT: Cisco X.25 Over TCP Protocol&lt;br /&gt;&lt;/pre&gt;  &lt;/blockquote&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Wide Area Network and WAN Protocols</title><link>http://mowewe.blogspot.com/2009/07/wide-area-network-and-wan-protocols.html</link><category>network handbook</category><author>noreply@blogger.com (fakrule bromo)</author><pubDate>Tue, 14 Jul 2009 07:14:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2364300410027338874.post-3812297784438834596</guid><description>&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;Description&lt;/b&gt;&lt;a name="A Wide"&gt;&lt;/a&gt; A Wide Area Network  (WAN) is a computer network covering multiple distance areas, which may spread  across the entire world. WANs often connect multiple smaller networks, such as  local area networks (LANs) or metro area networks (MANs). The world's most  popular WAN is the Internet. Some segments of the Internet are also WANs in  themselves. A wide area network may be privately owned or rented from a service  provider, but the term usually connotes the inclusion of public (shared user)  networks.  &lt;/p&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="network"&gt;&lt;/a&gt;A virtual private network (VPN) riding on  the public switched data network (PSDN) is often used by organizations for their  private and secured communications. VPN uses encryption and other techniques to  make it appear that the organisation has a dedicated network while making use of  the shared infrastructure of the WAN. &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="different networking"&gt;&lt;/a&gt;WANs generally utilize  different networking technologies and equipment than do LANs. Key technologies  often found in WANs include SONET, Frame Relay, X.25, ATM, and PPP. &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="and protocols"&gt;&lt;/a&gt;WAN technologies and protocols are  mostly data link layer (layer 2) protocols which are defined by many  organizations over time. The key organizations in this space are IETF for PPP,  ITU-T for ATM, Frame Relay, ISO for X.25 and SONET. &lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;Key Protocols&lt;/b&gt;&lt;a name="protocols are"&gt;&lt;/a&gt; The key WAN  protocols are listed as follows:&lt;/p&gt;&lt;p style="text-align: justify;" class="docText"&gt; &lt;/p&gt;&lt;p&gt;&lt;table style="width: 650px; height: 1325px;" class="allBorders" border="1" cellspacing="0"&gt; &lt;caption&gt; &lt;h5 class="docTableTitle"&gt;Table 0501. &lt;/h5&gt;&lt;/caption&gt; &lt;colgroup align="middle" span="2"&gt; &lt;col width="250"&gt; &lt;col width="250"&gt;&lt;/colgroup&gt; &lt;thead&gt; &lt;tr&gt; &lt;th class="docTableCell thead" style="text-align: center;" scope="col" align="middle"&gt;WAN&lt;/th&gt; &lt;th class="docTableCell thead" style="text-align: center;" scope="col" align="middle"&gt;Wide Area Network&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td class="docTableCell" rowspan="9" align="middle"&gt;ATM&lt;/td&gt; &lt;td class="docTableCell" align="middle"&gt;ATM: Asynchronous Transfer Mode Reference  Model&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;ATM Layer&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;AAL: ATM Adaptation Layer Type 0-5 reserved  for variable bit rate video transfer.&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;ATM UNI: ATM Signaling User-to-Network  Interface&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;LANE-NNI: LAN Emulation - Network to Network  Interface&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;LANE-UNI: LAN Emulation - User to Network  Interface&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;MPOA: Multi Protocol Over ATM&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;PNNI: Private Network-to-Network  Interface&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;Q.2931: ATM Signalling User  Interface&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" rowspan="2" align="middle"&gt;SONET/SDH&lt;/td&gt; &lt;td class="docTableCell" align="middle"&gt;Synchronous Optical Network and Synchronous  Digital Hierarchy&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;EoS: Ethernet over SONET/SDH&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" rowspan="6" align="middle"&gt;Broadband Access&lt;/td&gt; &lt;td class="docTableCell" align="middle"&gt;DOCSIS: Data Over Cable Service Interface  Specification&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;BISDN: Broadband Integrade Service Digital  Network&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;ISDN: Integrated Services Digital  Network&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;Q.931: ISDN network layer interface  protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;LAPD: ISDN Link Access Protocol Channel D  (Q.921)&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;xDSL: Digital Subscriber Line Technologies  (DSL, IDSL, ADSL, HDSL, SDSL, VDSL, G.Lite)&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" rowspan="13" align="middle"&gt;PPP&lt;/td&gt; &lt;td class="docTableCell" align="middle"&gt;PPP: Point-to-Point Protocols&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;BAP: PPP Bandwidth Allocation  Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;BACP: PPP Bandwidth Allocation Control  Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;BCP: PPP Bridging Control Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;CHAP: Challenge Handshake Authentication  Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;EAP: PPP Extensible Authentication  Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;LCP: PPP Link Control Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;MultiPPP: MultiLink PPP (MP)&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;NCP: PPP Network Control Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;PAP: Password Authentication  Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;PPPoE: PPP over Ethernet&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;PPPoA: PPP over ATM AAL5&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;PoS: Packet Over SONET/SDH&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" rowspan="3" align="middle"&gt;X.25&lt;/td&gt; &lt;td class="docTableCell" align="middle"&gt;HDLC: High Level Data Link Control  protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;LAPB: Link Access Procedure Balanced for  x.25&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;X.25: ITU-T WAN communication  protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" rowspan="2" align="middle"&gt;Frame Relay&lt;/td&gt; &lt;td class="docTableCell" align="middle"&gt;Frame Relay: WAN protocol for  internetworking at layer 2&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="middle"&gt;LAPF: Link Access Procedure/Protocol (ITU  Q.922)&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableFooter" align="middle"&gt;Other&lt;/td&gt; &lt;td class="docTableFooter" align="middle"&gt;IBM SDLC: Synchronous Data Link Control  protocol&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/p&gt;&lt;br /&gt;  &lt;p class="docText"&gt;&lt;b&gt;Related Protocols&lt;/b&gt; LAN, MAN, TCP/IP &lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>TCP/IP Protocols</title><link>http://mowewe.blogspot.com/2009/07/tcpip-protocols.html</link><category>network handbook</category><author>noreply@blogger.com (fakrule bromo)</author><pubDate>Tue, 14 Jul 2009 07:09:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2364300410027338874.post-8878497828215071973</guid><description>&lt;div style="text-align: justify;"&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;div style="text-align: justify;"&gt;&lt;div style="text-align: justify;"&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="The TCP"&gt;&lt;/a&gt;The TCP/IP protocol suite establishes the  technical foundation of the Internet. Development of the TCP/IP started as DOD  projects. Now, most protocols in the suite are developed by the Internet  Engineering Task Force (IETF) under the Internet Architecture Board (IAB), an  organization initially sponsored by the US government and now an open and  autonomous organization. The IAB provides the coordination for the R&amp;amp;D  underlying the TCP/IP protocols and guides the evolution of the Internet. The  TCP/IP protocols are well documented in the Request For Comments (RFC), which  are drafted, discussed, circulated and approved by the IETF committees. All  documents are open and free and can be found online in the IETF site listed in  the reference. &lt;/p&gt;&lt;div&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="exactly match"&gt;&lt;/a&gt;TCP/IP architecture does not  exactly match the OSI model. Unfortunately, there is no universal agreement  regarding how to describe TCP/IP with a layered model. It is generally agreed  that TCP/IP has fewer levels (from three to five layers) than the seven layers  of the OSI model. In this document, we force TCP/IP protocols into the OSI 7  layers structure for comparison purpose. &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="are addressing"&gt;&lt;/a&gt;The TCP/IP suite's core functions  are addressing and routing (IP/IPv6 in the networking layer) and transportation  control (TCP, UDP in the transport layer). &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;IP - Internet Protocol&lt;/b&gt;&lt;a name="network components"&gt;&lt;/a&gt;  Addressing of network components is a critical issue for information routing and  transmission in network communications. Each technology has its own convention  for transmitting messages between two machines within the same network. On a  LAN, messages are sent between machines by supplying the six bytes unique  identifier (the "MAC" address). In an SNA network, every machine has Logical  Units with their own network addresses. DECNET, AppleTalk, and Novell IPX all  have a scheme for assigning numbers to each local network and to each  workstation attached to the network.  &lt;/p&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="these local"&gt;&lt;/a&gt;On top of these local or vendor  specific network addresses, IP assigns a unique number to every network device  in the world, which is called an IP address. This IP address is a four-byte  value in IPv4 that, by convention, is expressed by converting each byte into a  decimal number (0 to 255) and separating the bytes with a period. In IPv6, the  IP address has been increased to 16 bytes. Details of the IP and IPv6 protocols  are presented in separate documents. &lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;TCP - Transmission Control Protocol&lt;/b&gt;&lt;a name="to applications"&gt;&lt;/a&gt; TCP provides a reliable stream delivery and virtual  connection service to applications through the use of sequenced acknowledgment  with retransmission of packets when necessary. TCP provides stream data  transfer, transportation reliability, efficient flow control, full-duplex  operation, and multiplexing. Check the TCP section for more details. In the  follwoing TCP/IP protocol stack table, we list all the protocols according to  their functions in mapping to the OSI 7 layers network communication reference  model.  &lt;/p&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="model closely"&gt;&lt;/a&gt;However, the TCP/IP architecture  does not follow the OSI model closely, for example, most TCP/IP applications  directly run on top of the transport layer protocols, TCP and UDP, without the  presentation and session layers in between. &lt;/p&gt;&lt;div style="text-align: justify;"&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;TCP/IP Protocol Stack &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;Application Layer&lt;/b&gt; &lt;/p&gt;&lt;div style="text-align: justify;"&gt;&lt;pre class="pre"&gt;BOOTP: Bootstrap Protocol&lt;br /&gt;DCAP: Data Link Switching Client Access Protocol&lt;br /&gt;DHCP: Dynamic Host Configuration Protocol&lt;br /&gt;DNS: Domain Name Systems&lt;br /&gt;FTP: File Transfer Protocol&lt;br /&gt;Finger: User Information Protocol&lt;br /&gt;HTTP: Hypertext Transfer Protocol&lt;br /&gt;S-HTTP: Secure Hypertext Transfer Protocol (S-HTTP)&lt;br /&gt;IMAP &amp;amp; IMAP4: Internet Message Access Protocol&lt;br /&gt;IPDC: IP Device Control&lt;br /&gt;IRCP (IRC): Internet Relay Chat Protocol&lt;br /&gt;LDAP: Lightweighted Directory Access Protocol&lt;br /&gt;MIME (S-MIME): Multipurpose Internet Mail Extensions (Secure MIME)&lt;br /&gt;NAT: Network Address Translation&lt;br /&gt;NNTP: Network News Transfer Protocol&lt;br /&gt;NTP: Network Time Protocol&lt;br /&gt;POP &amp;amp; POP3: Post Office Protocol (version 3)&lt;br /&gt;rlogin: Remote Login in Unix&lt;br /&gt;RMON: Remote Monitoring MIBs in SNMP&lt;br /&gt;SLP: Service Location Protocol&lt;br /&gt;SMTP: Simple Mail Transfer Protocol&lt;br /&gt;SNMP: Simple Network Management Protocol&lt;br /&gt;SNTP: Simple Network Time Protocol&lt;br /&gt;Syslog Protocol&lt;br /&gt;TELNET: TCP/IP Terminal Emulation Protocol&lt;br /&gt;TFTP: Trivial File Transfer Protocol&lt;br /&gt;URL: Uniform Resource Locator&lt;br /&gt;XMPP: Extensible Messaging and Presence Protocol&lt;br /&gt;X-Window: X Window or X Protocol or X System&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;       &lt;/pre&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;Presentation Layer&lt;/b&gt; LPP: Lightweight Presentation  Protocol &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;Session Layer&lt;/b&gt; RPC: Remote Procedure Call protocol &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;Transport Layer&lt;/b&gt; &lt;/p&gt;&lt;div style="text-align: justify;"&gt;&lt;pre&gt;ITOT: ISO Transport Over TCP/IP&lt;br /&gt;RDP: Reliable Data Protocol&lt;br /&gt;RUDP: Reliable UDP&lt;br /&gt;TALI: Transport Adapter Layer Interface&lt;br /&gt;TCP: Transmission Control Protocol&lt;br /&gt;UDP: User Datagram Protocol&lt;br /&gt;Van Jacobson: Compressed TCP&lt;br /&gt;&lt;/pre&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;Network Layer Routing&lt;/b&gt; &lt;/p&gt;&lt;div style="text-align: justify;"&gt;&lt;pre&gt;BGP/BGP-4: Border Gateway Protocol&lt;br /&gt;EGP: Exterior Gateway Protocol&lt;br /&gt;IP: Internet Protocol&lt;br /&gt;IPv6: Internet Protocol version 6&lt;br /&gt;ICMP/ICMPv6: Internet Control Message Protocol&lt;br /&gt;IRDP: ICMP Router Discovery Protocol&lt;br /&gt;Mobile IP: IP Mobility Support Protocol for IPv4 &amp;amp; IPv6&lt;br /&gt;NARP: NBMA Address Resolution Protocol&lt;br /&gt;NHRP: Next Hop Resolution Protocol&lt;br /&gt;OSPF: Open Shortest Path First&lt;br /&gt;RIP (RIP2): Routing Information Protocol&lt;br /&gt;RIPng: RIP for IPv6&lt;br /&gt;RSVP: Resource ReSerVation Protocol&lt;br /&gt;VRRP: Virtual Router Redundancy Protocol&lt;br /&gt;&lt;/pre&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;Multicast&lt;/b&gt; &lt;/p&gt;&lt;div style="text-align: justify;"&gt;&lt;pre&gt;BGMP: Border Gateway Multicast Protocol&lt;br /&gt;DVMRP: Distance Vector Multicast Routing Protocol&lt;br /&gt;IGMP: Internet Group Management Protocol&lt;br /&gt;MARS: Multicast Address Resolution Server&lt;br /&gt;MBGP: Multiprotocol BGP&lt;br /&gt;MOSPF: Multicast OSPF&lt;br /&gt;MSDP: Multicast Source Discovery Protocol&lt;br /&gt;MZAP: Multicast-Scope Zone Announcement Protocol&lt;br /&gt;PGM: Pragmatic General Multicast Protocol&lt;br /&gt;PIM-DM: Protocol Independent Multicast - Dense Mode&lt;br /&gt;PIM-SM: Protocol Independent Multicast - Sparse Mode&lt;br /&gt;&lt;/pre&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;MPLS Protocols&lt;/b&gt; &lt;/p&gt;&lt;div style="text-align: justify;"&gt;&lt;pre&gt;MPLS: Multi-Protocol Label Switching&lt;br /&gt;CR-LDP: Constraint-Based Label Distribution Protocol&lt;br /&gt;LDP: Label Distribution Protocol&lt;br /&gt;RSVP-TE: Resource ReSerVation Protocol-Traffic Engineering&lt;br /&gt;GMPLS: Generalized Multi-Protocol Lable Switching&lt;br /&gt;&lt;/pre&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;Data Link Layer&lt;/b&gt; &lt;/p&gt;&lt;div style="text-align: justify;"&gt;&lt;pre&gt;ARP and InARP: Address Resolution Protocol and Inverse ARP&lt;br /&gt;IPCP and IPv6CP: IP Control Protocol and IPv6 Control Protocol&lt;br /&gt;RARP: Reverse Address Resolution Protocol&lt;br /&gt;SLIP: Serial Line IP&lt;br /&gt;&lt;/pre&gt;  &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;Related protocol suites&lt;/b&gt; LAN, MAN, WAN, SAN, Security/VPN  &lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;Sponsor Source&lt;/b&gt; IETF, DARPA, ISO&lt;/p&gt;&lt;center&gt; &lt;p class="docText"&gt;&lt;img id="" alt="" src="part06_files/getfile.png" border="0" /&gt;&lt;/p&gt;&lt;/center&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>TCP and UDP Port Numbers</title><link>http://mowewe.blogspot.com/2009/07/tcp-and-udp-port-numbers.html</link><category>network handbook</category><author>noreply@blogger.com (fakrule bromo)</author><pubDate>Tue, 14 Jul 2009 06:45:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-2364300410027338874.post-5212153742879962943</guid><description>&lt;p style="text-align: justify;" class="docText"&gt;&lt;b&gt;Description&lt;/b&gt;&lt;a name="TCP and"&gt;&lt;/a&gt; TCP and UDP are both  transport protocols above the IP layer, which are interfaces between IP and  upper-layer processes. TCP and UDP protocol port numbers are designed to  distinguish multiple applications running on a single device with one IP address  from one another.  &lt;/p&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="applications may"&gt;&lt;/a&gt;Since many network applications  may be running on the same machine, computers need something to make sure the  correct software application on the destination computer gets the data packets  from the source machine, and to make sure replies get routed to the correct  application on the source computer. This is accomplished through the use of the  TCP or UDP "port numbers". In the TCP and UDP header, there are "Source Port"  and "Destination Port" fields which are used to indicate the message sending  process and receiving process identities defined. The combination of the IP  address and the port number is called "socket".&lt;br /&gt;&lt;/p&gt;&lt;p style="text-align: justify;" class="docText"&gt;&lt;a name="port ranges"&gt;&lt;/a&gt;There are three port ranges defined  by IETF IANA: the Well Known Ports, the Registered Ports, and the Dynamic and/or  Private Ports.&lt;br /&gt;&lt;/p&gt;&lt;ul style="text-align: justify;"&gt;&lt;li&gt;The Well Known Ports are in the range of 0 to 1023, which are assigned by the  IANA. In most cases, they can only be used by system (or root) processes or by  programs executed by privileged users. &lt;/li&gt;&lt;li style="text-align: justify;"&gt;The Registered Ports are in the range of 1024 to 49151, which are not controlled  by IANA. They are commonly used by ordinary user processes or programs executed  by ordinary users. &lt;/li&gt;&lt;li style="text-align: justify;"&gt;The Dynamic and/or Private Ports are in the range of 49152 to 65535, which are  typically used as source port by a TCP or UDP client, to communicate with a  remote TCP or UDP server, using a well-known port as destination port. &lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;p class="docText"&gt;Partial TCP UDP Port Numbers (Well-Known Ports) &lt;/p&gt; &lt;p class="docText"&gt;&lt;a name="app01tb01"&gt;&lt;/a&gt; &lt;/p&gt;&lt;p style="text-align: justify;"&gt; &lt;table style="text-align: left; margin-left: 0px; margin-right: 0px; width: 628px; height: 2143px;" class="allBorders" border="1" cellspacing="0"&gt; &lt;colgroup align="left" span="5"&gt; &lt;col width="80"&gt; &lt;col width="80"&gt; &lt;col width="80"&gt; &lt;col width="80"&gt; &lt;col width="200"&gt;&lt;/colgroup&gt; &lt;thead&gt;&lt;/thead&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;Port No.&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Protocol&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Service Name&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Aliases&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Comment&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;1&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;tcpmux&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP Port Service Multiplexer&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;2&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;compressnet&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Management Utility&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;3&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;compressnet&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Compression Process&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;7&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;echo&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Echo&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;13&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;daytime&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Daytime&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;19&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;chargen&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;ttytst source&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Character generator&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;20&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;ftp-data&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;File Transfer&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;21&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;ftp&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;FTP Control&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;22&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;ssh&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;SSH remote login protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;23&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;telnet&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Telnet&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;25&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;smtp&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;mail&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Simple Mail Transfer&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;37&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Time&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Time&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;39&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;RLP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;resource&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Resource Location Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;42&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;nameserver&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;name&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Host Name Server&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;43&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;nicname&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;whois&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Who Is&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;49&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TACACS&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TACACS: Login Host Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;53&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;domain&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;DNS&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Domain Name Server&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;67&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;bootps&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;dhcps&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Bootstrap Protocol Server&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;68&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;bootpc&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;dhcpc&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Bootstrap Protocol Client&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;69&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TFTP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Trivial File Transfer Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;70&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;gopher&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Gopher&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;79&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;finger&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Finger&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;80&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;http&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;www,http&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;World Wide Web&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;88&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;kerberos&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;krb5&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Kerberos&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;101&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;hostname&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;hostnames&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;NIC Host Name Server&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;102&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;iso-tsap&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;ISO-TSAP Class 0&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;107&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;rtelnet&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Remote Telnet Service&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;110&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Pop3&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;postoffice&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Post Office Protocol- Version 3&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;111&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;sunrpc&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;rpcbind portmap&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;SUN Remote Procedure Call&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;113&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Auth&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;ident tap&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Authentication Sevice&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;117&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Uucppath&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UUCP Path Service&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;118&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;sqlserv&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;SQL Services&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;119&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;nntp&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;usenet&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Network News Transfer Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;123&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Ntp&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Network Time Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;135&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;epmap&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;loc-srv&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;DCE endpoint resolution&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;137&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;netbiosns&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;nbname&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;NETBIOS Name Service&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;138&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;netbiosdgm&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;nbdatagram&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;NETBIOS Datagram Service&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;139&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;netbiosssn&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;nbsession&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;NETBIOS Session Service&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;143&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Imap&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;imap4&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Internet Message Access Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;158&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;pcmailsrv&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;repository&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;PC Mail Server&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;161&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;snmp&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;snmp&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;SNMP&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;162&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;snmptrap&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;snmptrap&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;SNMP TRAP&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;170&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Printsrv&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Network PostScript&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;194&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;irc&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Internet Relay Chat Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;213&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;ipx&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;IPX over IP&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;389&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;ldap&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Lightweight Directory Access  Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;401&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UPS&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Uninterruptible Power Supply&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;443&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;https&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;MCom&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;http protocol over TLS/SSL&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;445&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;CIFS&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Kerberos (v5)&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;464&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;kpasswd&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Message&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;500&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;isakmp&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;ike&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Internet Key Exchange (IPSec)&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;513&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;login&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Remote Login&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;513&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;who&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;whod&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Database of who's logged on, average  load&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;514&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;cmd&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;shell&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Automatic Authentication&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;514&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;syslog&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;515&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;printer&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;spooler&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Listens for incoming connections&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;517&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;talk&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Establishes TCP Connection&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;120&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;efs&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Extended File Name Server&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;520&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Routing&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;router routed&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;RIPv.1, RIPv.2&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;521&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Routing&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;router routed&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;RIPng&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;525&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Timed&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;timeserver&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Timeserver&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;530&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Courier&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;rpc&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;RPC&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;531&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;conference&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;chat&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;IRC Chat&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;532&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;netnews&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;readnews&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Readnews&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;533&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Netwall&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;For emergency broadcasts&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;540&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Uucp&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;uucpd&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Uucpd&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;543&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Klogin&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Kerberos login&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;544&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Kshell&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;krcmd&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Kerberos remote shell&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;550&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;newrwho&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;new-who&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;New-who&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;554&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;rtsp&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Real Time Stream Control Protocol&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;556&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;remotefs&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;rfs rfs_server&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Rfs Server&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;560&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;rmonitor&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;rmonitord&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Rmonitor&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;561&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;monitor&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;636&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Ldaps&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;sldap&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;LDAP over TLS/SSL&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;749&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;kerberosadm&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Kerberos administration&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;750&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Kerberos-iv&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;Kerberos version IV&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;1080&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP/UDP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;socks&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;socks&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;1812&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;RADIUS&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;RADIUS&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td class="docTableCell" align="left"&gt;1813&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;TCP&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;RADIUS&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;&lt;br /&gt;&lt;/td&gt; &lt;td class="docTableCell" align="left"&gt;RADIUS  accounting&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/p&gt;&lt;br /&gt; &lt;p class="docText"&gt;&lt;b&gt;Reference Links&lt;/b&gt; &lt;/p&gt;&lt;pre&gt;&lt;a class="docLink" href="http://www.iana.org/assignments/port-numbers" target="_blank"&gt;http://www.iana.org/assignments/port-numbers&lt;/a&gt;&lt;br /&gt;TCP and UDP port numbers&lt;br /&gt;&lt;/pre&gt;&lt;span style="font-weight: bold;"&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>