Monday, 17 October 2016

Protocol - Part 2


11.) Whois
     
           Whois protocol is a TCP or TCP-based transaction-oriented query/response protocol that is widely used to provide information services  to internet users.

          WHOIS is also provide information sufficient a contact to responsible party for a particular internet resources who can resolve, or reliably pass on the data to a party.

          It use port number 43.

12.) Terminal access controller access control system (TACACS)
      
          TACACS is authentication protocol that allow to remote access server to forward a user's logon
password to authentication server to determine whether access can be allowed to a given system.

          It use port number 49.

13.) Domain name system (DNS)

         Domain name system (DNS) provide naming conversation facility. It convert friendly username to IP address and IP address to friendly name.

       It use both TCP and UDP port number 53.

14.)  Dynamic Host configuration Protocol (DHCP) 
   
         Dynamic Host configuration Protocol (DHCP) is client/server protocol which provide IP addres on client system from a specific IP address range (also know as scope).
 
         DHCP also allow to supply IP gateway, DNS server address, WINS server address from a DHCP scope option.

         It use port number 67 and 68.

15.) Trivial File Transfer Protocol (TFTP)

       Trivial File Transfer Protocol (TFTP) allow to transferring files that is simpler to use than the file transfer protocol (FTP) but less capable.

       TFTP uses the user datagram protocol rather than Transmission control protocol (TCP).

       TFTP use port number 69.

16.) Finger Protocol 
        
        Finger Protocol is simple Network protocol for the exchange of human-oriented status and user
        information.

        It use port number 79.

17.)  Hyper Text Transfer Protocol (HTTP)

        Hyper text transfer protocol used by the world wide web and this protocol define how message
       are formatted and transmitted, and what action web servers and browsers should take in respons
       various command. HTTP also use for web browsing.

       It use port number 80.

18.)  Kerberos Protocol 
      
          Kerberos is computer network authentication protocol which allow to user to access network
          device in a secure manner in non-secure public area.

          It use port number 88.

19.)   Post Office Protocol Version 2 and 3 ( POP v2&v3)

         Post office protocol (POP) is responsible to retrieve the e-mails to client side.

         It use port number 109 (for V2) and 110 (for v3).

20.)  Secure File Transfer Protocol (SFTP) 

         It is a secure version of FTP, which facilities data access and data transfer over a secure shell
          (SSH) data stream.

          It use port number 115.


===============>  THANKS  FOR  VIEWING <======================