How To Get Around The Internet On A Pc Or Mac Or Mac (For Pc)

Size: px
Start display at page:

Download "How To Get Around The Internet On A Pc Or Mac Or Mac (For Pc)"

Transcription

1 Secure / Optimize / Analyze Internet usage List of protocols ANTIVIRUS Sophos update ZoneAlarm Updates Sophos antivirus update protocol. This protocol plug-in classifies the web traffic to the hosts 'zonealarm.com' and 'zonelabs.com', or associated to the SSL Common Name 'cm1.zonealarm.com'. APPLICATION SERVICE Apple App Store Apple Push Notification Service Dictionary Server Protocol End Point Mapper Google Play icloud ios_ota_update Lighweight Directory Access Protocol Name Service Provider Interface Perforce Protocol Port Mapper Samsung Apps Secure LDAP Service Location Protocol Simple Service Discovery Protocol Syslog Websphere Message Queue series The Apple App Store is a digital application distribution platform for ios developed and maintained by Apple Inc. APNS (Apple Push Notification Service) is an Apple service which forwards notifications from the servers of third party applications to ios devices. The DICT protocol is a TCP transaction based query/response protocol that enables a client to access dictionary definitions from a set of natural language dictionary databases. End Point Mapper is a protocol used by Exchange to determine the ports used by various services. Google Play (formerly Android Market) is an online software store developed by Google for Android OS devices. icloud is a cloud computing service developed by Apple Inc. which allows to store and share data, from an ios mobile (iphone, ipad, ipod Touch) or a Macintosh. ios OTA Update is the protocol used for ios updates Over The Air. LDAP (Lightweight Directory Access Protocol) is a protocol used for accessing directory services. Windows environments use this protocol to send queries to Active Directory. Name Service Provider Interface is a protocol used by Exchange. Perforce is a commercial, proprietary, centralized revision control system developed by Perforce Software, Inc. Port Mapper protocol maps RPC program and version numbers to port numbers. This program makes dynamic binding of remote programs possible. Samsung Apps is an application store for Samsung mobile and TV users. Secure LDAP is the Secure version of the LDAP protocol. Service Location Protocol is a decentralized, lightweight, scalable and extensible protocol for service discovery within a local area network. Simple Service Discovery Protocol (SSDP) provides a mechanism whereby network clients can discover desired network services. Syslog protocol is used for the transmission of event notification messages across networks between a client and a server. Mq (IBM Websphere MQ) is an inter-application communication protocol. Page 1

2 Windows Phone Marketplace X Font Server protocol Windows Phone Marketplace is a service by Microsoft for its Windows Phone 7 platform that allows users to browse and download applications that have been developed by third-parties. X Font Server is a standard communication protocol between an X server and a font renderer. AUDIO/VIDEO 050 plus 050 plus is a Japanese embedded smartphone application dedicated to audio-conferencing. adobe_connect Adobe Connect is a web communication system for the training, the marketing, the conferences and the online collaboration. Apple FaceTime FaceTime is an Apple video calling software which runs on ios based mobile devices. Babelgum This protocol plug-in classifies the web traffic to the host 'babelgum.com'. BBC Player BBC Player is an in-browser live video streaming service. Blip.tv TV Series This protocol plug-in classifies the web traffic to the host 'blip.tv', and the RTMP audio/video streams originating from the host 'blip.tv'. Blockbuster This protocol plug-in classifies the web traffic to the host '.blockbuster.com'. Cisco MeetingPlace MeetingPlace is a protocol used by the Cisco Unified MeetingPlace suite of voice, web, and video conferencing products. CNET TV This protocol plug-in classifies the web traffic to the host 'cnettv.cnet.com', and the RTMP audio/video streams originating from the host 'cnettv.cnet.com'. Flash Media Playback Adobe Flash Media Playback is a dynamic HTTP streaming protocol used to access video contents from a smart client application. fring - Peer to Peer Mobile VOIP Fring is a peer-to-peer Mobile VoIP based Internet telephony network. gotomeeting - online meeting GoToMeeting is an online meeting service developed by Citrix. service (Citrix) grooveshark Grooveshark is an online unlimited service for music. H225 The H225 Protocol is a VoIP protocol, used for call signaling and RAS (Registration, Admission and Status). H245 H245 is a VoIP protocol, used for call signaling codec negotiation. h248 Protocol (Megaco) in binary h248 Protocol (Megaco) in binary mode. mode h248 Protocol (Megaco) in text h248 Protocol (Megaco) in text mode. mode HBO GO This protocol plug-in classifies the web traffic to the host '.hbogo.com'. Howcast This protocol plug-in classifies the web traffic to the host '.howcast.com'. Hulu This protocol plug-in classifies the web traffic to the host '.hulu.com'. icall icall is proprietary voice/video over IP protocol. Icecast Icecast is a protocol used to stream audio files over HTTP. iheartradio This protocol plug-in classifies the web traffic to the hosts 'iheartradio.com' and 'iheart.com', and the RTMP audio/video streams originating from the host 'iheart.com'. Inter Asterisk exchange Inter Asterisk exchange (IAX2) is a data exchange protocol between Asterisk servers. ISO Base Media File Format The ISO Base Media File Format, as described in ISO/IEC :2008 (MPEG-4 Part 12). itunes itunes is an Apple proprietary digital media player application, used for playing and organizing digital music and video files. Jajah Jajah is a VoIP provider owned by Telefonica Europe. Livestream (formerly Mogulus) This protocol plug-in classifies the web traffic to the hosts 'livestream.com' and 'a749.g.akamai.net', or associated to the SSL Common Name 'livestream.com', and the RTMP audio/video streams originating from the host 'livestream.com'. Media Gateway Control Protocol MGCP protocol is used as signaling protocol for voice IP applications. Metacafe This protocol plug-in classifies the web traffic to the hosts '.metacafe.com', 'v.mccont.com' and '.mcstatic.com'. Microsoft Multimedia Streaming MMS protocol is used extensively nowadays by Microsoft video streaming servers. It enables to stream a file in real time to many Page 2

3 Mpeg 2 Transmission MSN Video Netflix Paltalk audio chat Paltalk video PPlive ppstream - P2P based Streamed Media Q931 QQLive Network Player QVOD Player Real Data Transport Real Time Control Protocol Real Time Protocol Real Time Streaming Protocol Rhapsody Session Initiation Protocol ShoutCast Silverlight Skinny Client Control Protocol Sky Player Slacker Personal Radio Slingbox Sopcast SoundCloud Spotify Tango Video Calls The Message Session Relay Protocol (MSRP) TuneIn TVAnts Protocol simultaneous viewers. MPEG-Transport Stream is a protocol used for MPEG flows transmission This protocol is used by MSN Messenger for video conversations (is not used anymore since MSN version 8.X). NetFlix is a site using Silverlight protocol to stream videos. Proprietary protocol used by Paltalk in audio chats. Proprietary protocol used by Paltalk in video. PPLIVE is an application intended to watch TV in peer-to-peer. The PPLIVE application has two main functions : live TV(streaming) and on-demand TV (VOD). These are two different protocols. This protocol plug-in handles both. The ppstream protocol provides audio and video streaming. It is based on bittorent (peer-to-peer) technology. It is mainly used in China. The Q.931 protocol enables the use of voice and image on networks for video conferencing. It provides no flow control, however, or retransmission, since the underlying layers are assumed to be reliable and the circuit-oriented nature of ISDN allocates bandwidth in fixed increments of 64 kbps. Q.931 does manage connection setup and close. Like TCP, Q.931 documents both the protocol itself and a state machine. QQLive is an application intended to watch TV in Peer-to-Peer mode. QVOD is a peer-to-peer based Video-On-Demand player. This protocol is used to transport audio/video data. The real-time transport Control protocol RTP allows monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. RTP is the real-time transport protocol used to transmit real-time data, such as audio, video or simulation data, over multicast or unicast network services. The Real Time Streaming Protocol (RTSP) is an application-level protocol for control over the delivery of data with real-time properties. RTSP provides an extensible framework to enable controlled, on-demand delivery of real-time data, such as audio and video. Rhapsody is a subcription based music streaming service. Session Initiation Protocol (SIP) is the Internet Engineering Task Force's (IETF's) standard for multimedia conferencing over IP. Like other VoIP protocols, SIP is designed to address the functions of signaling and session management within a packet telephony network. Shoutcast is a protocol used to stream audio files over HTTP. Silverlight is a Microsoft web browser plugin designed to render programable animations and to stream videos. It quite similar with Adobe Flash: animated vector graphics, H264 video streaming Skinny Client Control Protocol (SCCP) is a Cisco proprietary protocol used between Cisco Call Manager and Cisco VOIP phones. It is also supported by some other vendors. This protocol plug-in classifies the web traffic to the host 'skyplayer.sky.com'. This protocol plug-in classifies the web traffic to the host '.slacker.com', and the RTMP audio/video streams originating from the host 'slacker.com'. Slingbox is a streaming protocol over the Internet used to watch and control TV shows received from your home devices. Sopcast is a video streaming service based on a peer-to-peer protocol : SOP (Streaming Over Peer-to-peer). This protocol plug-in classifies the web traffic to the hosts 'soundcloud.com' and 'sndcdn.com', or associated to the SSL Common Names 'api.soundcloud.com' and 'sndcdn.com'. Spotify is an application of musical streaming. Tango is an embedded smartphone application dedicated to audio/video-conference. Message Session Relay Protocol (MSRP) is a protocol for transmitting instant messages, defined by RFC This protocol plug-in classifies the web traffic to the hosts 'tunein.com' and 'radiotime.com'. TVAnts is a peer-to-peer TV software, using the BitTorrent peer-to-peer technology. It provides a way to watch on the PC most cable and satellite as well as WebTV. Page 3

4 TVU network player UUSee Protocol VeohTV VEVO Viber voddler WebEx X25 Yahoo Screen YMSG Video Zattoo TVUPlayer is an application intended to watch TV in peer_to-peer. Uusee is a peer-to-peer TV software, using the BitTorrent peer-to-peer technology. It provides a way to watch on the PC most cable and satellite TV as well as WebTV on PC. It uses the network coding technology. VeohTV is a VOD streaming service which includes both client software and a website with embedded flash videos. This protocol plug-in classifies the web traffic to the host '.vevo.com', and the RTMP audio/video streams originating from the host 'vevo.com'. Viber is a free embedded voice over-ip application, for smartphones. Voddler is a streaming client application distributing movies and television programming using a patented hybrid peer-to-peer distribution system. WebEx is an online meeting, videoconferencing and collaborative application X.25 is a packet switched data network protocol which defines an international recommendation for the exchange of data as well as control information between a user device (host), called Data Terminal Equipment (DTE) and a network node, called Data Circuit Terminating Equipment (DCE). This protocol plug-in classifies the web traffic to the host 'screen.yahoo.com', and the RTMP audio/video streams originating from the host 'screen.yahoo.com'. (versions prior to ) This protocol is used by Yahoo Messenger for video conversations. Zattoo is website and a set of peer-to-peer TV applications. AUTHENTICATION Diameter Identification Protocol Kerberos Remote Authentication Dial-In User Service TACACS+ Yellow Page Passwd Yellow Pages Server Diameter is an AAA (authentication, authorization and accounting) protocol for computer networks and an alternative to RADIUS. The Identification Protocol provides a means to determine the identity of a user of a specific TCP connection. Kerberos provides a means to verify the identities of the different workstations on an open (unprotected) network. RADIUS (Remote Authentication Dial-In User Service) is a client/server protocol that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. TACACS+ (Terminal Access Controller Access-Control System Plus) is a Cisco Systems proprietary protocol which provides access control for routers, network access servers and other networked computing devices via one or more centralized servers. The Yellow Page Password protocol enables the modification of logins and passwords in Network Interface System cards. Yellow Pages Server is a protocol used to distribute NIS databases to client systems within an NIS domain. DATABASE db2 protocol Distributed Relational Database Architecture FileMaker Pro informix protocol Mobilink MySQL Protocol Postgres DB2 is a relational model database server from IBM which has its roots in the early 1980s. It runs on IBM mainframes and is also available for Linux/Unix/Windows. DRDA is a protocol for carrying out SQL queries and commands. FileMaker Pro is a relational database application from FileMaker Inc and which runs on Microsoft Windows as well as Mac OS. Informix is a family of relational database management systems developed by IBM. IBM acquired the Informix technology in 2001 but it dates back to 1981.It runs on IBM mainframes and is also available for Linux/Unix/Windows. Mobilink is a proprietary, binary, TCP based protocol which is used to synchronize the contents of multiple mobile client databases with a central SQL Server. The clients can run on smartphones, Java applets, etc., in addition to PC computers. MySQL is an open source relational database management system (RDBMS) that uses Structured Query Language (SQL), the most popular language for adding, accessing, and processing data in a database. PostgreSQL is a sophisticated Object-Relational DBMS, supporting almost all SQL constructs, including subselects, transactions, and userdefined types and functions. Page 4

5 Sqli Sybase Tabular Data Stream Transparent Network Service (Oracle) The SQLI protocol (Structured Query Language Interface) is a proprietary protocol seemingly used exclusively in IBM Informix servers. Sybase protocols are used to exchange messages (namely authentication and SQL queries) between database clients and servers developed by the Sybase Company. TDS protocol is used to communicate between SQL applications and a SQL Server. Transparent Network Service (TNS) is the Oracle (version 8 or higher) networking technology that provides a single application interface to all industry-standard networking protocols. To connect to a database, users initiate a connect request by passing information (username and password) along with a short name for the database service they wish to connect to. ENCRYPTED Internet Security Association and Key Management Protocol IP secure Online Certificate Status Protocol Secure Shell Secure Socket Layer Tor The Internet Security Association and Key Management Protocol (ISAKMP) defines procedures and packet formats to establish, negotiate, modify and delete Security Associations (SA). IPSec protocol provides services for securing hosts communications. IPsec provides two security services: Authentication Header (AH), which allows authentication of the sender and Encapsulating Security Payload (ESP), which allows both authentication of the sender and encryption of data. This network protocol is used for validating certificates. Secure Shell (SSH), sometimes known as Secure Socket Shell, is a UNIX-based command interface and a protocol for obtaining secure access to a remote computer. Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission on the Internet. SSL has recently been succeeded by Transport Layer Security (TLS), which is based on SSL. Tor is an application that intends to provide online anonymity. ERP SAP SAP is both a protocol and the name of an ERP application used by most companies. FILE SERVEUR aimini Cross File Transfer File Transfer Protocol File Transfer Protocol Data FTP over SSL Gmail drive HotLine ibackup - online files backup protocol Mount Aimini is an online solution to store, send and share files. CFT (Cross File Transfer) is a file transfer software developed by Axway The FTP protocol is used for reliable data transfer between a client and a server. This protocol is used to transport data in data connection of FTP communication. Secure version of the FTP protocol. GMAIL Drive is a Shell Namespace Extension that creates a virtual file system around a Google Mail account, allowing Gmail as a storage medium. GMAIL Drive is only classified over http and not over https. The Hotline protocol is used to upload/download files, to chat and to get news about chatters (it is not a peer-to-peer protocol) ibackup is an online file backup protocol. The Mount protocol is related to the NFS protocol. It provides operating system specific services to launch the NFS protocol -- looking up server path names, validating user identity, and checking access permissions. Netbios NetBIOS defines a software interface and standard methods providing a communication interface between the application program and the attached medium. NetBIOS is used in various LAN (Ethernet, Token Ring etc) as well as WAN environments such TCP/IP, PPP and X.25 networks. Network File System The NFS protocol provides transparent remote access to shared file systems across networks as described in RFC Network Lock Manager The network lock manager is a facility that works in cooperation with the Network File System (NFS) to provide a System V style of Page 5

6 Remote synchronous (file transfer) Rquota Rstat Rusers Server Message Block (Windows File Server) Sync Trivial File Transfer Protocol Yellow Pages Update advisory file and record locking over the network. Rsync is a protocol used by various services performing updates. It greatly speeds up the update process since only the differences between two sets of files are transfered, instead of the whole new file. The RQuota protocol enables the implementation of quotas on remote machines. It is used in conjunction with the NFS protocol. The RStat protocol is used in the Sun NFS family to exchange statistics on network activity. The RUser's protocol provides a service that lists users currently logged on a remote server. The Server Message Block Protocol (SMB/SMB2) provides a method for client applications to read and write to files and to request services from server programs in a computers network. The Sync protocol is an RPC service allowing data synchronisation. Trivial File Transfer Protocol (TFTP) is a file transfer protocol that is simpler to use than the File Transfer Protocol (FTP) but that proposes less features. TFTP uses the User Datagram Protocol (UDP) rather than the Transmission Control Protocol (TCP). The Yellow Pages Update protocol enables information updates in Network Information Services (NIS) cards. FILE TRANSFER AIM Transfer Protocol IRC File Transfer Data Jabber File Transfer PalTalk Transfer Protocol QQ transfer Protocol Ymsg Transfer Protocol AIM is an instant messaging protocol This protocol is used to transport data in IRC file transfer. Jabber transfer is an open standard to transfer file between two Jabber clients. Paltalk is an instant messaging protocol File transfer over QQ Ce protocole gère les transferts de fichiers sur ymsg. FORUM Google groups Internet Relay Chat LinkedIn website Mibbit MSN groups Network News Transport Protocol odnoklassniki Secure IRC Secure NNTP vkontakte Windows Live groups Yahoo groups Google groups IRC (Internet Relay Chat) is an instant messaging protocol. LinkedIn is professional social network. This protocol plug-in classifies the web traffic to the host '02.chat.mibbit.com', or associated to the SSL Common Names 'web2.mibbit.com' and 'chat.mibbit.com'. MSN Groups was a website part of the MSN network which hosted online communities, and which contained Web pages, hosted images, and contained a message board. MSN Groups was shut down on February 2009 as part of a migration of online applications and services to the Windows Live brand, and later renovated as Windows Live Groups. The Network News Transport Protocol (NNTP) is used for the distribution, inquiry, retrieval and posting of net news articles using a reliable stream-based mechanism. Odnoklassniki is a Russian social network. IRCs is the secure version of the IRC protocol. Secure version of the NNTP protocol. vkontakte is an European social network service popular among Russian-Speaking users. It is quite similar to Facebook. Windows Live Groups is an online service by Microsoft that enables users to create their social groups for sharing, discussion and coordination. Yahoo! Groups offers free mailing lists, photo and file sharing, group calendars and more. GAME Page 6

7 All Slots Casino CounterStrike EVE Online EverQuest II Half-Life and Half-Life 2 IMVU Lineage II Nintendo Wi-Fi Connection Playstation Network Poker Stars Quake RuneScape Steam WiiConnect24 World of Warcraft Xbox Live Steam This protocol plug-in classifies the web traffic to the host 'setup.realgaming.com'. Cstrike is a protocol used by CounterStrike game, by Steam. Eve Online is a multiplayer online game edited by CCP. Everquest is a 3D fantasy massively multiplayer online role-playing game (MMORPG), for Windows platforms, developed by Sony Online Entertainment(SOE). Half-Life and Half-Life 2 are two first-person shooter video games developed by Valve Corporation and provide on-line gaming features. This protocol plug-in classifies the web traffic to the host 'imvu.com'. Lineage2 is a MMORPG developed by NCSoft. Wi-Fi Connection (WFC) is the Nintendo on-line gaming service for the Wii and DS videogame systems. PlayStation Network (PSN) is the on-line gaming service for consoles made by Sony. Pocker Stars is an online poker cardroom. Quake is a protocol allowing communication between Quake Clients and Quake servers. Massively Multiplayer Online Role Playing Game published by Jadex. Steam is a digital distribution, digital rights management, multiplayer and communications platform developed by Valve Corporation. WiiConnect24 is an asynchronous communication protocol implemented on the Nintendo Wii gaming system. It used by some information channels and services embedded in the console, and by some games too. WOW is an online role-playing game. Online multiplayer gaming and digital media delivery service created and operated by Microsoft Corporation. Steam is a digital distribution, digital rights management, multiplayer and communications platform developed by Valve Corporation. INSTANT MESSAGING AIM express AirAIM AOL Instant Messenger Badoo Ebuddy FriendVox Gadu Gadu Gizmo Protocol Google Chat Hands On Video Relay Services Inc IBM Lotus Sametime ICQ2Go IloveIM Jabber Protocol Kaixin Chat KakaoTalk AOL Instant Messaging Express supports many of the standard features included in AIM, but does not provide advanced features like file transfer, audio chat or video conferencing This protocol plug-in classifies the web traffic to the host 'airaim.com', or associated to the SSL Common Name 'airaim.com'. AIM is an instant messaging protocol. Originally, it meant 'AOL Instant Messenger'. Badoo is a dating oriented social networking website. ebuddy is a web and mobile messenger which supports various instant messaging. This protocol plug-in classifies the web traffic to the host 'friendvox.com'. Gadu Gadu is a Polish instant messaging protocol. Gizmo is an instant messaging protocol. Google chat is an online Webmessenger from Google. This protocol plug-in classifies the web traffic to the hosts 'i711.com', 'hovrs.com' and 'purple.us', or associated to the SSL Common Name 'hovrs.com'. IBM Lotus Sametime is a client server application and middleware platform that provides real-time, unified communications and collaboration for enterprises. This protocol plug-in classifies the web traffic to the hosts 'c.icq.com' and 'api.icq.net'. This protocol plug-in classifies the web traffic to the host 'iloveim.com'. Jabber is an open standard instant messaging and presence system. This protocol plug-in classifies the web traffic to the host 'kaixin001.com'. KakaoTalk is an instant messenging platform for mobile devices; users or group of users can send messages, share photos, videos and contact information. Page 7

8 KoolIM This protocol plug-in classifies the web traffic to the host 'koolim.com'. Line Line is a Japanese Instant Messaging and Voip application for smartphones and PCs. Call metadata is no more extracted from line, but can be raised from the SIP layer. MessengerFX This protocol plug-in classifies the web traffic to the host 'messengerfx.com'. MS Communicator Microsoft Office Communicator is a client software launched in October 2007 for conferences which aims to communicate between collaborators using instant messaging, VoIP and videoconference. MSN live for Mobile MSNMobile is the MSN instant messenger for mobile. MSN Messenger The MSN protocol allows the exchange of instant messages. The MSN protocol is used by the Microsoft software Microsoft Messenger Mxit MXit (pronounced 'mix it') is a free instant messaging software application developed by MXit Lifestyle in South Africa that runs on GPRS/3G mobile phones and on PCs. netmeeting ils protocol Netmeeting ILS is the protocol used between Netmeeting and Internet Locator Servers (ILS). Netmeeting is a VoIP and multi-point videoconferencing client included in many versions of Microsoft Window. A Internet Locator Server (ILS) is a directory used to find other users and facilitate rendezvous. OICQ Oicq is a proprietary messaging protocol developed by Tencent, at the origin of the qq protocol. oovoo oovoo is an instant messenger application, with audio/video support. PalTalk Protocol Paltalk is an instant messaging protocol. Phweet This protocol plug-in classifies the web traffic to the host 'blog.phweet.com'. QQ QQ is the most popular free instant messaging computer program in China. RadiusIM This protocol plug-in classifies the web traffic to the host 'radiusim.com'. Secure AIM AIMS is the secure version of AIM. sina UCSina is a Chinese chat client similar to MSN Messenger or ICQ. It contains several features like: chat, news portal, micro blogging, music player, online storage (files, photos, etc..) Skype Skype is a widely used voice over IP protocol. Teamspeak v2 The proprietary TeamSpeak2 protocol is used by gamers and oriented TeamSpeak2 VoIP software. TeamSpeak v3 TeamSpeak 3 continues the legacy of the original TeamSpeak communication system. TeamSpeak 3 is not merely an extension of its predecessors but rather a complete rewrite in C++ of its proprietary protocol and core technology. WhatsApp Messenger WhatsApp Messenger is a cross-platform, instant, mobile messaging application which allows the users to exchange messages without having to pay for SMS. WhatsApp Messenger is available for iphone, BlackBerry, Android and Nokia and yes, those phones can all message each other. Yahoo Messenger Yahoo Messenger is used by the Yahoo Instant Messenger application to send instant messages, files and s between users. Yahoo Messenger conference This protocol is used in signaling part in a conference. service Yahoo messenger on web Yahoo webmessenger. Yoono This protocol plug-in classifies the web traffic to the hosts 'api.yoono.com' and 'cdn.yoono.com'. Zoho IM This protocol plug-in classifies the web traffic to the host 'wms.zoho.com', or associated to the SSL Common Name 'wms0.zoho.com'. MAIL Internet Message Access Protocol version 4 Lotus Notes MS Exchange Message API Post Office Protocol The IMAP protocol (Internet Message Access Protocol Version 4) enables a client to access and manipulate electronic mail messages on a server. Lotus Notes is a groupware knowledge management system which integrates various services such as web browsing, calendaring and mailing. MS Exchange Message API is a protocol used by Exchange clients to retrieve their s. Post Office Protocol - Version 3 (POP3) allows a workstation to simply and dynamically access a mail stored on a mail server. Page 8

9 Secure IMAP Secure POP3 Secure SMTP Simple Mail Transfer Protocol IMAPS is the secure version of the IMAP protocol. Secure version of the POP3 protocol. Secure version of the SMTP protocol. The Simple Mail Transfer Protocol (SMTP) is a protocol used for transfering mail reliably and efficiently. MICROSOFT OFFICE Microsoft Office Groove Microsoft Office Groove is a desktop application designed for document collaboration in teams with members who are regularly offline or who do not share the same network security clearance. MIDDLEWARE Advance Message Queuing Protocol Datagram Inter-ORB Protocol Distributed Computing Environment Remote Procedure Call General Inter-ORB Protocol (Corba) Internet Inter-ORB Protocol Microsoft Remote Procedure Call Remote Procedure Call RMI over IIOP Secure General Inter-ORB Protocol Simple Object Access Protocol AMQP (Advanced Message Queuing Protocol) is an open standard application layer protocol for message-oriented middleware DIOP is a GIOP implementation over UDP which aims to be more efficient than the TCP one. The DCERPC protocol is an RPC implementation used in Distributed Computing Environments. This protocol is used by many software applications including Microsft Exchange. The General Inter-Orb protocol (GIOP) is used to make requests or return replies between ORBs in a Corba environment. IIOP is the GIOP implementation over TCP. Microsoft Remote Procedure Call (MSRPC) is the Microsoft implementation of the DCE RPC mechanism. RPC (Remote Procedure Call) is an easy and popular paradigm for implementing the client-server model of distributed computing. A request is sent to a remote system to execute a designated procedure, using arguments supplied, and the result is returned to the caller. RMI-IIOP (Remote Method Invocation over Internet Inter-ORB Protocol) delivers CORBA distributed architecture to Java 2 platform, using both remote method invocation system RMI and IIOP protocol. This protocol is the secure version of the GIOP protocol. SOAP is a lightweight protocol intended for exchanging structured information in a decentralized, distributed environment. It defines, using XML technologies, an extensible messaging framework containing a message construct that can be exchanged over a variety of underlying protocols. NETWORK ERRORS Incomplete Malformed TCP Syn flood Incomplete is used when the protocol signature is too long. A packet belongs to the protocol 'malformed' if the protocol announced by the lower level protocol does not correspond to the one determined by the system. The synflood protocol detects syn flood attacks. NETWORK MANAGEMENT Altiris Cisco Netflow Protocol Altiris provides service-oriented management solutions which allow managing IT infrastructures. NetFlow is a Cisco protocol that provides nearly real-time traffic monitoring, aggregation and statistic evaluation, multicriteria data flow selection, using source/destination IP addresses, protocols, etc. Page 9

10 Simple Network Management SNMP is a request/response protocol that communicates management information between two types of SNMP software entities: Protocol SNMP applications (also called SNMP managers) and SNMP agents. Zabbix agent Agent for Zabbix monitoring server. Uses TCP port NETWORK SERVICE Protocol The protocol is used to carry data (at MAC level) on IEEE Wireless Local Area Networks. CGI Proxy CGIProxy is a proxy software package. A CGI (Common Gateway Interface) Proxy is a proxy that appears as a web page allowing the user access to all sites through it. Concurrent Versions System The Concurrent Versions System keeps track of all work and all changes in a set of files, typically the implementation of a software project, and allows several developers to collaborate. Connection Oriented Transfer COTP (Connection Oriented Transport Protocol) is a protocol ensuring the transport service in the OSI model. Protocol (ISO) Domain Name Service The DNS protocol is used to translate internet names ( into IP addresses and vice versa. DTLS Protocol DTLS stands for Datagram Transport Layer Security protocol. It provides communications privacy for datagram protocols, and prevents eavesdropping, tampering, or message forgery. Dynamic Host Configuration The DHCP protocol is used to configure automatically the network parameters of a station. Protocol Echo Protocol The echo service simply sends back to the originating source any data it receives. Group 3 facsimile communication This protocol is used to exchanges FAXes on top on TCP/IP. over IP Inter-Control Center IEC /TASE.2. Inter-Control Center Communications Protocol (ICCP) provides data exchange over Wide Area Networks (WANs) Communications Protocol between utility control centers, utilities, power pools, regional control centers, and Non-Utility Generators. Internet Control Message ICMPv6 is the diagnostic protocol used in IPv6 networks. Protocol for IP6 Internet Protocol V6 IPv6 is the 'next generation' protocol designed by the IETF to replace the current version Internet Protocol, IP Version 4 ('IPv4'). ISO 8327 Session Protocol ISO /X.225 OSI Session Protocol (SP). ISO Association Control ISO /X.227 OSI Association Control SErvice (ACSE). Service ISO 8823 Presentation Protocol ISO 8823/X.226 OSI PRESENTATION PROTOCOL (PP). ISO 9506 Manufacturing Message ISO 9506 Manufacturing Message Specification (MMS). Specification Mobile IPv6 Mobile IP is a proposed standard protocol that builds on the Internet Protocol by making mobility transparent to applications and higher level protocols like TCP. Multipoint Communication Multipoint Communication Service (MCS) is a multipoint data delivery service for use in multimedia and audiovisual conferencing Service service. It provides the mechanism for multipoint aware applications to send data to all or a subset of the group with a single send primitive and to force, if desired, a uniformly sequenced reception of data for all users. Netbios Name Service NetBios Name Service (NBNS) is a protocol resulting from NetBios, and which makes it possible to manage the names in a Microsoft NetBios network. NetBios names are human readable and NBNS serves the same purpose as the DNS system in IP environments. Netware Core Protocol The NetWare Core Protocol (NCP) is a network protocol used to access file, print, directory, clock synchronization, messaging, remote command execution and other network service functions. Network Time Protocol Network Time Protocol (NTP) is a time synchronization system for computer clocks through the Internet network. It provides mechanisms to synchronize time and coordinate time distribution in a large network. PHProxy PHProxy is a web HTTP proxy programmed in PHP meant to bypass firewalls and access otherwise inaccessible resources. Page 10

11 Protocol Independant Multicast Real Time Messaging Protocol Resource Location Protocol Simple Network Paging Protocol Simple Traversal of UDP through NATs Subversion version control system TIBCO RendezVous Protocol Time Protocol Transport Control Protocol User Datagram Protocol Whois Protocol Windows Live File Storage WINS Replication protocol The PIM Protocol provides an efficient routing of multicast groups that may span wide-area Internet zones. Real Time Messaging Protocol (RTMP) is a proprietary protocol developed by Adobe Systems for streaming audio, video and data over the Internet, between a Flash player and a server. Resource Location Protocol (RLP) is a protocol used to discover the location of resources present in a network. This protocol defines a method by which a pager can receive a message over the Internet STUN (Session Traversal Utilities for NAT) allows a client behind a NAT to establish UDP tunnels between two hosts. Subversion, version control system. This protocol is used in the bank sector. This protocol provides a site-independent, machine readable date and time. TCP is a protocol providing a connection-oriented and reliable transfer service. It is used by most TCP/IP applications today. The User Datagram Protocol is a transport protocol providing a simple but non-reliable message transfer service in IP networks. It is used by most applications that do not require a reliable delivery transmission service. WHOIS is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block, or an autonomous system, but is also used for a wider range of other information. Windows Live File Storage is a Microsoft web service designed to be used by other Microsoft web services that may need storage, for example msn, skydrive, etc. WINS (Windows Internet Naming Service) is Microsoft's implementation of NetBIOS Name Service (NBNS), which is a name server and service for NetBIOS computer names. This plug-in classifies replication flows between servers. Client-to-Server flows are handled by the nbns plug-in. PEER TO PEER AppleJuice Ares Protocol Bittorrent Protocol Blubster Clip2Net Diino DirectConnect Edonkey Filetopia Foxy GNUnet protocol Gnutella GoBoogy Protocol Imesh Kazaa Kugou/Kugoo Live Mesh AppleJuice is a peer-to-peer file exchange protocol similar to E-Donkey. Ares is a peer-to-peer protocol. BitTorrent is a peer-to-peer protocol. Blubster is a peer-to-peer music file sharing software. Blubster uses the Manolito protocol, therefore a part of its traffic is classified as Manolito. This protocol plug-in classifies the web traffic to the host 'clip2net.com'. This protocol plug-in classifies the web traffic associated to the SSL Common Name 'diino.com'. DirectConnect is a peer-to-peer protocol. Edonkey is a peer-to-peer protocol. Filetopia is a free, proprietary peer-to-peer client software for Windows. It uses an encrypted protocol for all its communications. In addition to the usual peer-to-peer features, Filetopia provides a chat, a buddy search and a message board. Foxy is a peer-to-peer protocol based on GnucDNA. GNUnet is a framework for secure peer-to-peer networking mainly used for anonymous file sharing. It is part of the GNU project. Gnutella is a peer-to-peer protocol. Goboogy is a peer-to-peer protocol. imesh is a peer-to-peer protocol. KaZaA is a peer-to-peer protocol. Kugou is a multimedia peer-to-peer application providing file sharing, chat or broadcasting services. This protocol plug-in classifies the web traffic associated to the SSL Common Names 'accounts.mesh.com', 'storage.mesh.com' and 'enclosure.mesh.com'. Page 11

12 manolito Mute Protocol OpenFT Protocol Pando protocol QQMusic QQStream Soribada SoulSeek utp (Micro Transport Protocol) Vakaka Winmx Xunlei/Thunder protocol Manolito is a peer-to-peer file sharing software. Mute is a peer-to-peer protocol. OpenFT is a peer-to-peer protocol. pando is a peer-to-peer protocol. QQMusic is a Chinese peer-to-peer file sharing software. Its purpose is to download/stream audio files. QQStream is a Chinese peer-to-peer file sharing software. QQstream is a meta protocol which contains data stream of QQLive and QQMusic. This protocol plug-in classifies the web traffic to the host 'kpop.soribada.com'. Soulseek is a peer-to-peer protocol. BitTorrent transport layer. This protocol plug-in classifies the web traffic to the host 'vakaka.com'. WinMX is a freeware peer-to-peer file sharing program authored by Frontcode Technologies that runs on Microsoft Windows operating systems, and created in Xunlei/Thunder is a Chinese multi-protocol download manager. PRINTER Common Unix Printer System HP Printer Job Language Internet Printing Protocol Line Printer Daemon The Common Unix Printer System (CUPS) protocol is a cross-platform printing solution for UNIX environments. It is based on the 'Internet Printing Protocol' and it is compatible with Microsoft operating systems since Windows The Jetdirect protocol is used by HP network printers. Internet Printing Protocol (IPP) is a standard used for remote printing using Internet tools and technologies. LPR is a protocol providing printing services and used in Berkeley distributions of the Unix operating system. ROUTING Border Gateway Protocol Cisco Hot Standby Router Protocol(HSRP) Open Short Path First Routing Information Protocol V1 Routing Information Protocol V2 Routing Internet Protocol ng1 Border Gateway Protocol (BGP) is an inter Autonomous Systems routing protocol used by most ISPs. The Cisco Hot Standby Router Protocol (HSRP) enables you to manage router redundancy in a network. OSPF (Open Short Path First) is a link state routing protocol used within large autonomous system networks. It is is considered to be the best Inter Routing protocol today and it is use it strongly encouraged. RIP1 (Routing Information Protocol Version 1) is a Distance Vector routing protocol used in Inter Autonomous Systems. RIP2 (Routing Information Protocol Version 2) is an enhancement of the Version 1 of the protocol. The main differences are the use of multicast instead of broadcast, and the support of variable length subnet mask networks since subnets are now sent inside the updates. RIPng (RIP New Generation) is intended to allow routers to exchange information for computing routes through an IPv6-based network. RIPng is a distance vector protocol. RIPng should be implemented only in routers since IPv6 provides other mechanisms for router discovery. SÉCURITY SERVICE GhostSurf Protocol McAfee Client update GhostSurf is an internet privacy application. McAfee is one of the leaders in intrusion prevention and security risk management on the web. TERMINAL Page 12

13 Remote Login Remote Shell Secure TELNET Telnet Tnvip The Rlogin protocol is used to establish a bidirectional communication to distant terminals. The RSH protocol allows a user to establish a secure connection to a remote host and to obtain a shell allowing commands to be sent to the remote machine to be executed. Secure version of the Telnet. Telnet provides a fairly general, bi-directional, eight-bit byte oriented communications facility. Its primary aim is to provide a standard method of interfacing between terminal devices and terminal-oriented processes. Telnet VIP is an emulation of the Telnet protocol for VIP (Visual Information Projection) terminals. THIN CLIENT Citrix GoToMyPC Remote Access Citrix JEDI ClearCase GotoDevice Independant Computing Architecture (Citrix) PCAnywhere Radmin Remote Desktop Protocol (Windows Terminal Server) Remote Frame Buffer (VNC) ShowMyPc TeamViewer VMWare X Display Manager Control Protocol X-Window Citrix GoToMyPC is a secured web-based remote access solution, enabling to take control of a PC/MAC from a web browser. JEDI is the name of the CITRIX streaming connection protocol. ClearCase is a source control / configuration management tool from IBM's 'Rational' division GoToDevice is a remote control and administration tool. ICA (Independent Computing Architecture) is a communication protocol and a property of the Citrix Company. PCAnywhere is a remote control solution. It can manage both Windows and Linux systems. Enhanced video performance and built-in AES 256-bit encryption help make communications fast and secure. PCAnywhere also features powerful file-transfer capabilities. Radmin is a control software which is able to establish a remote secure connection between computers. A key component of Terminal Server is the Remote Desktop Protocol which allows a thin client to communicate with the Terminal Server over the network. This protocol is based on International Telecommunications Union's (ITU) T.120 protocol, an international, standard multichannel conferencing protocol currently used in the Microsoft NetMeeting conferencing software product. It is tuned for highbandwidth enterprise environments and will also support encrypted sessions. RFB (Remote Frame Buffer) is a simple protocol for remote access to graphical user interfaces. This protocol plug-in classifies the web traffic to the host 'showmypc.com', or associated to the SSL Common Name 'showmypc.com'. TeamViewer is an application that enables a connection to a remote computer in order to perform maintenance operations. It is also possible to show the current display to a remote computer, to transfer files, and to create a VPN tunnel. VMWare is a protocol used by the VMWare application, allowing it to have network interfaces and remote access to a virtual machine. XDMCP is an extension of the X11 protocol that addresses the issue of discovering and authenticating available X servers on the LAN. X11 is designed to communicate all the information necessary to operate a window system over a single asynchronous bi-directional stream of 8-bit bytes. The X protocol specifies four types of messages but named extensions can also be defined to extend the system. TUNNELING AnalogBit tcp-over-dns Control And Provisioning of Wireless Access Points (CAPWAP) GPRS Tunneling Protocol version 2 HTTP Tunnel Level 2 Tunneling Protocol Tcp-over-dns contains a special dns server and a special dns client. The client and server work in tandem to provide a TCP and UDP tunnel through the standard DNS protocol. CAPWAP stands for Control And Provisioning of Wireless Access Points. It is a standard, interoperable protocol that enables a controller to manage a collection of wireless access points. The GPRS Tunneling Protocol (GTP) version 2 is used in G4 mobile networks (LTE). Its purpose is to exchange control message between the MME, the SGW et the PGW. These messages lead to the création of an IP data tunnel between the enodeb, the SGW and the PGW, thus allowing mobile station data to be transmited. HTTP Tunnel protocol is used to tunnel protocols inside an HTTP stream. Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the Internet. Page 13

14 Mobile IP OpenVPN Point-to-Point Tunneling Protocol socks2http SOCKSv4 SOCKSv5 Teredo Ultrasurf XOT (X25 over TCP) Mobile IP is an IETF standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining a permanent IP address. OpenVPN is an open source software application that implements virtual private network (VPN) techniques for creating secure pointto-point or site-to-site connections in routed or bridged configurations and remote access facilities. Point-to-Point Tunneling Protocol allows the Point to Point Protocol (PPP) to be tunnelled through an IP network. Socks2http is a client software aiming to make a tunnel. Socks 4 is an authentication protocol. SOCKS5(SOCKet Secure v5) routes network packets between a client and server through a proxy server with authentication. The Teredo protocol enables IPv6 tunnelling over UDP, traversing NATs, and with minimum over-head. Ultrasurf is a tunneling protocol used by the Ultrasurf software for Windows. The classification is based on an IP address range analysis. Protocol used to transport x25 data over TCP in IP network. WAP MMS Encapsulation Short message peer-to-peer protocol Universal Computer Protocol WAP Binary XML Wireless Session Protocol Wireless Transaction Protocol Wireless Transport layer Security The MultiMedia Messages Encapsulation protocol (MMSE) is used by mobile stations to send multimedia messages. SMPP is a telecommunications industry protocol for exchanging SMS messages between SMS peer entities. Universal Computer Protocol is used by some mobile phones to send SMS. The WAP Binary XML protocol defines an encoding scheme for the binary data used in WAP environments. Wireless Session Protocol (WSP) is an application layer protocol present in the WAP stack. It is used by mobile stations to send SMS for example. Wireless Transaction Protocol (WTP) is a transport layer protocol which belongs to the WAP stack. It provides a reliable transmission of network packets and is very similar to TCP. Wireless Transport Layer Security (WTLS) is a security protocol, part of the WAP stack. It sits between the WTP and WDP layers in the WAP communications stack. WEB 51 This protocol plug-in classifies the web traffic to the host '51.la'. 56 This protocol plug-in classifies the web traffic to the host '56.com'. 58 This protocol plug-in classifies the web traffic to the host '58.com'. 163 This protocol plug-in classifies the web traffic to the host '163.com'. 360 This protocol plug-in classifies the web traffic to the host '360.cn' This protocol plug-in classifies the web traffic to the host '4399.com'. 01net This protocol plug-in classifies the web traffic to the host '01net.com'. 0zz0 0zz0 is an online solution to store, send and share files 10086cn This protocol plug-in classifies the web traffic to the host '10086.cn', or associated to the SSL Common Name '10086.cn'. 114la This protocol plug-in classifies the web traffic to the host '114la.com'. 115com This protocol plug-in classifies the web traffic to the host '115.com', or associated to the SSL Common Name '115.com' cn This protocol plug-in classifies the web traffic to the host ' cn'. 11st This protocol plug-in classifies the web traffic to the host '11st.co.kr'. 123people This protocol plug-in classifies the web traffic to the host '123people.com'. 2Shared 2shared is an online space for sharing and storage. 360buy This protocol plug-in classifies the web traffic to the host '360buy.com'. Page 14

15 4Shared 4shared is an online space for sharing and storage. 51job This protocol plug-in classifies the web traffic to the host '51job.com'. abcnews This protocol plug-in classifies the web traffic to the hosts 'abcnews.com' and 'abcnews.go.com'. about This protocol plug-in classifies the web traffic to the host 'about.com'. accuweather This protocol plug-in classifies the web traffic to the host 'accuweather.com'. acer This protocol plug-in classifies the web traffic to the host 'acer.com'. This protocol plug-in classifies the web traffic to the host ' or associated to the SSL Common Name acrobat ' Activesync Microsoft ActiveSync is a mobile data synchronization technology and protocol developed by Microsoft, originally released in addictinggames This protocol plug-in classifies the web traffic to the host 'addictinggames.com'. ADNStream This protocol plug-in classifies the web traffic associated to the SSL Common Name 'adnstream.tv'. Adobe Flash-Plugin Update Flash exchanges plug-in version numbers with Adobe servers. This protocol plug-in classifies the web traffic to the hosts 'connectpro emea.acrobat.com', 'connectpro adobeconnect.com' and ' or associated to the SSL Common Name Adobe Meeting Remote Control 'emea.acrobat.com'. Adobe Update Manager The Adobe Update Manager is a program which maintains up-to-date versions of some Adobe software. Adrive This protocol plug-in classifies the web traffic to the host 'adrive.com', or associated to the SSL Common Name 'adrive.com'. adultadworld This protocol plug-in classifies the web traffic to the host 'adultadworld.com'. adultfriendfinder This protocol plug-in classifies the web traffic to the host 'adultfriendfinder.com'. Advogato This protocol plug-in classifies the web traffic to the host 'advogato.org'. agame This protocol plug-in classifies the web traffic to the host 'agame.com'. aiaigame This protocol plug-in classifies the web traffic to the host 'aiaigame.com'. Aizhan This protocol plug-in classifies the web traffic to the host 'aizhan.com'. This protocol plug-in classifies the web traffic to the hosts 'akamai.net', 'akamaihd.net', 'akamaiedge.net', 'edgesuite.net', 'edgekey.net' Akamai Technologies CDN and 'srip.net', or associated to the SSL Common Names 'akamai.net' and 'akamaihd.net'. alexa This protocol plug-in classifies the web traffic to the host 'alexa.com'. Alibaba This protocol plug-in classifies the web traffic to the host 'alibaba.com'. Alimama This protocol plug-in classifies the web traffic to the host 'alimama.com'. Alipay This protocol plug-in classifies the web traffic to the host 'alipay.com', or associated to the SSL Common Name 'alipay.com'. aljazeera This protocol plug-in classifies the web traffic to the host 'aljazeera.net'. allocine This protocol plug-in classifies the web traffic to the host 'allocine.fr'. This protocol plug-in classifies the web traffic to the hosts 'amazon.cn', 'amazon.co.jp', 'amazon.co.uk', 'amazon.com', 'amazon.de' and amazon 'amazon.fr'. Amazon MP3 Amazon MP3 is an online music store owned and operated by Amazon.com. Amazon Video Amazon Video is an online video on demand service owned and operated by Amazon.com. Amazon Web Services/Cloudfront CDN This protocol plug-in classifies the web traffic to the hosts 'amazonaws.com' and 'cloudfront.net', or associated to the SSL Common Name 'amazonaws.com'. This protocol plug-in classifies the web traffic to the host 'americanexpress.com', or associated to the SSL Common Name americanexpress 'americanexpress.com'. Amie street This protocol plug-in classifies the web traffic to the host 'amiestreet.com'. anobii This protocol plug-in classifies the web traffic to the host 'anobii.com'. answers This protocol plug-in classifies the web traffic to the host 'answers.com'. Apple This protocol plug-in classifies the web traffic to the host ' or associated to the SSL Common Name 'apple.com'. Page 15

16 Apple Airport Apple Update Archive armorgames Asiae Ask ASmallWorld Athlinks att Auction aufeminin Avatars united Avg Update Avira Update Avoidr Babycenter badongo Baidu Bca.co Bebo Berniaga Bigadda BigTent Bigupload Biip Bing BitDefender Update BlackBerry BlackPlanet Blogdetik blogger blogspot Blogster Blokus Bloomberg bluejayfilms Bolt Bonpoo Books iread Box.net Apple Airport is a protocol aiming to configure a wireless device. Apple_update is the protocol used for apple softwares updates. Archive.org is building a digital library of Internet sites and other cultural artifacts in digital form. Like a paper library, Archive.org provides free access to researchers, historians, scholars, and the general audience. This protocol plug-in classifies the web traffic to the host 'armorgames.com'. This protocol plug-in classifies the web traffic to the host 'asiae.co.kr'. This protocol plug-in classifies the web traffic to the hosts 'ask.com' and 'fr.ask.com'. This protocol plug-in classifies the web traffic to the host 'asmallworld.net'. This protocol plug-in classifies the web traffic to the host 'athlinks.com'. This protocol plug-in classifies the web traffic to the host 'att.com'. This protocol plug-in classifies the web traffic to the host ' This protocol plug-in classifies the web traffic to the host 'aufeminin.com'. This protocol plug-in classifies the web traffic to the host 'avatarsunited.com'. Avg_update is the protocol used for AVG softwares updates. Avira_update is the protocol used for Avira softwares updates. This protocol plug-in classifies the web traffic to the host 'avoidr.com'. This protocol plug-in classifies the web traffic to the host 'babycenter.com'. Badongo is an online solution to store, send and share files Baidu is a Chinese search engine for websites, audio files and images. Baidu means 'One hundred degrees' in English. This protocol plug-in classifies the web traffic to the host 'bca.co.id'. Bebo is a social networking website, enabling users to connect to relatives, friends, or unknown people. This protocol plug-in classifies the web traffic to the host 'berniaga.com'. This protocol plug-in classifies the web traffic to the host 'bigadda.com'. This protocol plug-in classifies the web traffic to the host 'bigtent.com'. This protocol plug-in classifies the web traffic to the host 'bigupload.com', or associated to the SSL Common Name 'www3.bigupload.com'. This protocol plug-in classifies the web traffic to the host 'biip.no'. This protocol is used for sending user queries to the Bing search engine. BitDefender_update is the protocol used for BitDefender softwares updates. This protocol refers to all Blackberry mobile device communications over wifi. This protocol plug-in classifies the web traffic to the host 'blackplanet.com'. This protocol plug-in classifies the web traffic to the host 'Blogdetik.com'. This protocol plug-in classifies the web traffic to the host 'blogger.com'. This protocol plug-in classifies the web traffic to the host 'blogspot.com'. This protocol plug-in classifies the web traffic to the host 'blogster.com'. This protocol plug-in classifies the web traffic to the host 'blokus.fr'. Bloomberg is a website about business and financial news. This protocol plug-in classifies the web traffic to the host 'bluejayfilms.webs.com'. This protocol plug-in classifies the web traffic to the hosts 'bolt.com' and 'bolt3.com'. This protocol plug-in classifies the web traffic to the host 'bonpoo.com'. This protocol plug-in classifies the web traffic to the host 'weread.com'. This protocol plug-in classifies the web traffic to the host 'box.net', or associated to the SSL Common Names 'box.net' and 'box.com'. Page 16

17 Brighttalk BuddyBuddy Bugs businessweek Buzznet BypassThat Cafemom cam4 Campfire camzap capitalone Care2 cartoonnetwork cdiscount Cellufun Channel4 china.com china.com.cn Chinaz Chosun Chosun Daily Chrome Update CJ mall Classmates Cloob clubic cnet cnn cntv Cnzz College Blender comcast Concur CoralCDN user Couch surfing Coupang Csdn Daily booth Daily strengh dailymail This protocol plug-in classifies the web traffic to the host 'brighttalk.com'. This protocol plug-in classifies the web traffic to the host 'buddybuddy.co.kr'. This protocol plug-in classifies the web traffic to the host 'bugs.co.kr'. This protocol plug-in classifies the web traffic to the host 'businessweek.com'. This protocol plug-in classifies the web traffic to the host 'buzznet.com'. This protocol plug-in classifies the web traffic to the host 'bypassthat.com'. This protocol plug-in classifies the web traffic to the host 'cafemom.com'. This protocol plug-in classifies the web traffic to the host 'cam4.com'. This protocol plug-in classifies the web traffic to the host 'campfirenow.com', or associated to the SSL Common Name 'campfirenow.com'. This protocol plug-in classifies the web traffic to the host 'camzap.com'. This protocol plug-in classifies the web traffic to the host 'capitalone.com', or associated to the SSL Common Name 'capitalone.com'. This protocol plug-in classifies the web traffic to the host 'care2.com'. This protocol plug-in classifies the web traffic to the host 'cartoonnetwork.com'. This protocol plug-in classifies the web traffic to the host 'cdiscount.com'. This protocol plug-in classifies the web traffic to the host 'm.cellufun.com'. This protocol plug-in classifies the web traffic to the host 'channel4.com'. This protocol plug-in classifies the web traffic to the host 'china.com'. This protocol plug-in classifies the web traffic to the host 'china.com.cn'. This protocol plug-in classifies the web traffic to the host 'chinaz.com'. This protocol plug-in classifies the web traffic to the host 'chosun.com'. This protocol plug-in classifies the web traffic to the host ' Chrome Update is the protocol for the updates of the Google chrome browser. This protocol plug-in classifies the web traffic to the host 'cjmall.com'. This protocol plug-in classifies the web traffic to the host 'classmates.com'. This protocol plug-in classifies the web traffic to the host 'cloob.com'. This protocol plug-in classifies the web traffic to the host 'clubic.com'. This protocol plug-in classifies the web traffic to the host 'cnet.com'. This protocol plug-in classifies the web traffic to the hosts 'cnn.co.uk' and 'cnn.com'. This protocol plug-in classifies the web traffic to the hosts 'cntv.cn' and 'cctv.com'. This protocol plug-in classifies the web traffic to the hosts 'cnzz.com' and 'cnzz.net'. This protocol plug-in classifies the web traffic to the host 'collegeblender.com'. This protocol plug-in classifies the web traffic to the hosts 'comcast.com' and 'comcast.net'. This protocol plug-in classifies the web traffic to the hosts 'concur.com' and 'concursolutions.com', or associated to the SSL Common Names 'concursolutions.com' and '.concur.com'. This protocol plug-in classifies the web traffic to the host 'nyud.net'. This protocol plug-in classifies the web traffic to the host 'couchsurfing.org'. This protocol plug-in classifies the web traffic to the host 'coupang.com'. This protocol plug-in classifies the web traffic to the host 'csdn.net'. This protocol plug-in classifies the web traffic to the host 'dailybooth.com'. This protocol plug-in classifies the web traffic to the host 'dailystrength.org'. This protocol plug-in classifies the web traffic to the host 'dailymail.co.uk'. Page 17

18 Dailymotion daum davidov Debian/Ubuntu Update Decayenne Deezer Delicious Update DepositFiles Detik Detiknews Deviant Art digg DigitalVerse DirectDownload Links directv Disaboom DivShare Dnshop Docstoc Dol2day Donga DontStayIn Douban Doubleclick ads Draugiem Dreamwiz Dropbox drupal Dynamic Intranet EarthCam Ebay Elftown Emaps Eons Epernicus Dailymotion is a website where users can send or watch videos. This protocol plug-in classifies the web traffic to the host 'daum.net'. This protocol plug-in classifies the web traffic to the host 'davidov.do.am'. Update protocol of APT, the Debian/Ubuntu packet manager. This protocol plug-in classifies the web traffic to the host 'decayenne.com'. This protocol plug-in classifies the web traffic to the host 'deezer.com'. Delicious (formerly del.icio.us, pronounced 'delicious') is a social bookmarking web service for storing, sharing, and discovering web bookmarks. This protocol plug-in classifies the web traffic to the host 'depositfiles.com'. This protocol plug-in classifies the web traffic to the host 'Detik.com'. This protocol plug-in classifies the web traffic to the hosts 'Detiknews.com' and 'news.detik.com'. This protocol plug-in classifies the web traffic to the host 'deviantart.com'. This protocol plug-in classifies the web traffic to the host 'digg.com'. This protocol plug-in classifies the web traffic to the host 'digitalverse.org'. This protocol plug-in classifies the web traffic to the hosts 'data.hu', 'filearchiv.ru', 'filepost.ru', 'ifolder.ru', 'filehost.tv', 'sharebase.to', 'load.to', 'uploaded.to', 'leteckaposta.cz', 'yourfiles.biz', 'yourfiles.to', 'rapidshare.de', 'ultrashare.de', 'uploadyourfiles.de', 'speedshare.org', 'files-upload.com', 'rapidupload.com', 'turboupload.com', 'fileho.com', 'bestsharing.com', 'quicksharing.com', 'sharebig.com', 'chinamofile.com', 'hotfile.com', 'savefile.com', 'sendmefile.com', 'sharebigfile.com', 'up-file.com', 'easy-share.com', 'fastshare.com', 'live-share.com', 'ftp2share.com', 'gigeshare.com', 'megashare.com', 'gigasize.com', 'sharebee.com', 'megashares.com', 'fileupyours.com', 'filefactory.com', 'filefront.com', 'uploadingit.com', 'uploadpower.com', 'file-upload.net', 'simpleupload.net', 'wiiupload.net', 'filesend.net', 'filer.net', 'livedepot.net' and 'odsiebie.najlepsze.net'. This protocol plug-in classifies the web traffic to the host 'directv.com'. This protocol plug-in classifies the web traffic to the host 'disaboom.com'. This protocol plug-in classifies the web traffic to the host 'divshare.com', or associated to the SSL Common Name 'divshare.com'. This protocol plug-in classifies the web traffic to the host 'dnshop.com'. This protocol plug-in classifies the web traffic to the hosts 'docstoccdn.com' and 'docstoc.com'. This protocol plug-in classifies the web traffic to the host 'dol2day.com'. This protocol plug-in classifies the web traffic to the host 'donga.com'. This protocol plug-in classifies the web traffic to the host 'dontstayin.com'. This protocol plug-in classifies the web traffic to the host 'douban.com'. Doubleclick ads This protocol plug-in classifies the web traffic to the host 'draugiem.lv'. This protocol plug-in classifies the web traffic to the host 'dreamwiz.com'. This protocol plug-in classifies the web traffic to the host 'dropbox.com', or associated to the SSL Common Name 'dropbox.com'. This protocol plug-in classifies the web traffic to the host 'drupal.org'. This protocol plug-in classifies the web traffic to the host 'dynamicintranet.com', or associated to the SSL Common Name 'dynamicintranet.com'. This protocol plug-in classifies the web traffic to the host 'earthcam.com'. Ebay is a famous online auction and shopping website. This protocol plug-in classifies the web traffic to the host 'elftown.com'. This protocol plug-in classifies the web traffic to the host 'empas.com'. This protocol plug-in classifies the web traffic to the host 'eons.com'. This protocol plug-in classifies the web traffic to the host 'epernicus.com', or associated to the SSL Common Name 'epernicus.com'. Page 18

19 eroom.net ESET NOD32 Antivirus Updates esnips Evony Expedia Experience Project Exploroo Eyejot Facebook Facebook Apps Faceparty Faces Fetlife File Dropper File Host Fileflyer Filer.cx Files.to Filestube Fillos de Galicia FilmAffinity firefox_update FledgeWing Flickr Flixster Flumotion Fluxiom Fly Proxy Fogbugz Fotki Fotolog Foursquare foxmovies foxnews foxsports FreeBSD Updates FreeeTV Friends Reunited Friendster Fruhstuckstreff This protocol plug-in classifies the web traffic associated to the SSL Common Name 'project1.eroom.net'. Virus definitions and engine updates for the ESET NOD32 anti-virus. This protocol plug-in classifies the web traffic to the host 'esnips.com'. This protocol plug-in classifies the web traffic to the host 'evony.com'. This protocol plug-in classifies the web traffic to the hosts 'expedia.com' and 'expedia.fr'. This protocol plug-in classifies the web traffic to the host 'experienceproject.com'. This protocol plug-in classifies the web traffic to the host 'exploroo.com'. This protocol plug-in classifies the web traffic to the hosts 'eyejot.com', 'eyejot.typepad.com' and 'eyejot.uservoice.com'. Facebook is a social network. Facebook Applications. This protocol plug-in classifies the web traffic to the host 'faceparty.com'. This protocol plug-in classifies the web traffic to the host 'faces.com'. This protocol plug-in classifies the web traffic to the host 'fetlife.com', or associated to the SSL Common Name 'fetlife.com'. This protocol plug-in classifies the web traffic to the host 'filedropper.com'. This protocol plug-in classifies the web traffic to the host 'filehost.ro'. FileFlyer is an online solution to store, send and share files This protocol plug-in classifies the web traffic to the host 'filer.cx'. This protocol plug-in classifies the web traffic to the host 'files.to'. This protocol plug-in classifies the web traffic to the host 'filestube.com'. This protocol plug-in classifies the web traffic to the host 'fillos.org'. This protocol plug-in classifies the web traffic to the host 'filmaffinity.com'. Mozilla Firefox update protocol for the browser and its plugins. This only applies to updates made from the browser and not those manually downloaded. This protocol plug-in classifies the web traffic to the host 'fledgewing.com'. This protocol plug-in classifies the web traffic to the host 'flickr.com'. This protocol plug-in classifies the web traffic to the host 'flixster.com'. This protocol plug-in classifies the web traffic to the host 'flumotion.com'. This protocol plug-in classifies the web traffic to the host 'fluxiom.com', or associated to the SSL Common Name 'fluxiom.com'. This protocol plug-in classifies the web traffic to the host 'flyproxy.com', or associated to the SSL Common Names 'flyproxy.com' and 'SD259.slicebox.net'. This protocol plug-in classifies the web traffic to the host 'fogbugz.com', or associated to the SSL Common Name 'fogbugz.com'. This protocol plug-in classifies the web traffic to the host 'fotki.com'. This protocol plug-in classifies the web traffic to the host 'fotolog.com'. This protocol plug-in classifies the web traffic to the host 'foursquare.com', or associated to the SSL Common Name 'foursquare.com'. This protocol plug-in classifies the web traffic to the host 'foxmovies.jp'. This protocol plug-in classifies the web traffic to the host 'foxnews.com'. This protocol plug-in classifies the web traffic to the host 'foxsports.com'. This protocol is used for FreeBSD updates. This protocol plug-in classifies the web traffic to the host 'freeetv.com'. This protocol plug-in classifies the web traffic to the host 'friendsreunited.com'. Friendster is a social networking website, enabling users to connect to relatives, friends, or unknown people. This protocol plug-in classifies the web traffic to the host 'fruehstueckstreff.de'. Page 19

20 Fsecure Update Fsecure_update is the protocol used for fsecure softwares updates. Fubar This protocol plug-in classifies the web traffic to the host 'fubar.com'. Funshion video player Funshion player is a Chinese service for downloading and streaming movies. GaiaOnline This protocol plug-in classifies the web traffic to the host 'gaiaonline.com'. GamerDNA This protocol plug-in classifies the web traffic to the host 'gamerdna.com'. Games_co This protocol plug-in classifies the web traffic to the host 'games.co.id'. Ganji This protocol plug-in classifies the web traffic to the host 'ganji.com'. Gather This protocol plug-in classifies the web traffic to the host 'gather.com'. Gays This protocol plug-in classifies the web traffic to the host 'gays.com'. Geni This protocol plug-in classifies the web traffic to the host 'geni.com'. Gigaup This protocol plug-in classifies the web traffic to the host 'gigaup.fr', or associated to the SSL Common Name 'gigaup.fr'. This protocol plug-in classifies the web traffic to the host 'desktop.glidesociety.com', or associated to the SSL Common Name Glide 'glidesociety.com'. Gmarket This protocol plug-in classifies the web traffic to the host 'gmarket.co.kr'. Gogoyoko This protocol plug-in classifies the web traffic to the host 'gogoyoko.com'. Goodreads This protocol plug-in classifies the web traffic to the host 'goodreads.com'. Google This protocol is used for sending user queries to the Google search engine. Google ads Google Ads is the online ad service from Google. Google Analytics is the enterprise-class web analytics solution that gives you rich insights into your website traffic and marketing Google Analytics effectiveness. Google App Engine is a platform as a service (PaaS) cloud computing platform for developing and hosting web applications in Google App Engine Google-managed data centers. Google Cache Google Cache saves a copy of the webpages which were found by the Google search engine. Google Desktop Google Desktop is a desktop search software made by Google, with indexed document metadata. Google Earth Google Earth is a program used to view a virtual Earth in 3D. Google Generic This protocol is a generic layer used as a base for all the Google protocols. Google GStatic GStatic is a download server providing static resources (like CSS or scripts) for Google web applications. Google Maps Google Maps can be used to calculate routes and to look at maps. Google Picasa Google Picasa is a digital photo and video organizer used to edit and synchronize pictures or videos over the web. Google Plus Google Plus is a social network. Google Skymap Google Sky Map is an outer space viewer Android mobile application. The Google Toolbar is an extension for Internet Explorer and Mozilla Firefox which provides a search box, a pop-up blocker, a translator, Google Toolbar etc.. Google Translate Google Translate is the Google translation tool. Gougou Search Engine Gougou is a chinese web search engine. Gratisindo This protocol plug-in classifies the web traffic to the host 'gratisindo.co.id'. Grono This protocol plug-in classifies the web traffic to the host 'grono.net'. groupon This protocol plug-in classifies the web traffic to the hosts 'groupon.com', 'groupon.com.br', 'groupon.fr' and 'groupon.jp'. Groupwise Novell Groupwise is a groupware, instant-messaging and mail-application. Gsshop This protocol plug-in classifies the web traffic to the host 'gsshop.com'. Gudanglagu This protocol plug-in classifies the web traffic to the host 'Gudanglagu.com'. Gyao This protocol plug-in classifies the web traffic to the host 'gyao.yahoo.co.jp'. Habbo This protocol plug-in classifies the web traffic to the hosts 'habbo.fr' and 'habbo.com'. Page 20

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

List of Common TCP/IP port numbers

List of Common TCP/IP port numbers List of Common TCP/IP port numbers For those of you who configure firewalls, routers, port forwarding, and applications connectivity, this regularly updated document lists all standard, common, well known,

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Distributed Systems. 2. Application Layer

Distributed Systems. 2. Application Layer Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

TCP/UDP # General Name Short Description

TCP/UDP # General Name Short Description This appendix is designed to provide general information about service ports that are discovered on IP networks. Outlined are ports 1-80, along with many other common higher ports and specific ports found

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

User Datagram Protocol - Wikipedia, the free encyclopedia

User Datagram Protocol - Wikipedia, the free encyclopedia Página 1 de 6 User Datagram Protocol From Wikipedia, the free encyclopedia User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite. Using UDP, programs on networked computers

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel Gregory Fresnais Director of International Business Development Email: gfresnais@bpointsys.com,

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts

More information

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network) 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

Roles for Servers in the SCW Database

Roles for Servers in the SCW Database Roles for Servers in the SCW Database Application BizTalk 2004 Business Activity BizTalk 2004 Messaging and Orchestration ASP.NET session state BizTalk 2004 EDI Integration BizTalk 2004 Rules Engine Audit

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10) APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist nurul@apnic.net Specialties: Routing &

More information

Cisco IOS Firewall. Scenarios

Cisco IOS Firewall. Scenarios Cisco IOS Firewall Common Deployment Scenarios http://www.cisco.com/go/iosfirewall com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 Cisco IOS Firewall Feature Overview

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

Network Security Fundamentals

Network Security Fundamentals APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security IPv6

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

GPRS / 3G Services: VPN solutions supported

GPRS / 3G Services: VPN solutions supported GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive

More information

(d-5273) CCIE Security v3.0 Written Exam Topics

(d-5273) CCIE Security v3.0 Written Exam Topics (d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please

More information

Windows Server 2003 default services

Windows Server 2003 default services Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.

More information

Communication ports used by Citrix Technologies. July 2011 Version 1.5

Communication ports used by Citrix Technologies. July 2011 Version 1.5 Communication ports used by Citrix Technologies July 2011 Version 1.5 Overview Introduction This document provides an overview of ports that are used by Citrix components and must be considered as part

More information

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Chapter 4: Security of the architecture, and lower layer security (network security) 1 Chapter 4: Security of the architecture, and lower layer security (network security) 1 Outline Security of the architecture Access control Lower layer security Data link layer VPN access Wireless access

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

1. Built-In SPI Firewall to Protect Your Enterprise Network 2. Multi-Spam-Filtering Function Providing High Spam-Filtering Accuracy

1. Built-In SPI Firewall to Protect Your Enterprise Network 2. Multi-Spam-Filtering Function Providing High Spam-Filtering Accuracy 1. Built-In SPI Firewall to Protect Your Enterprise Network BroadScan UTM core design is based on its Stateful Packet Inspection ( SPI ) firewall, providing complete firewall protection. By default, the

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

1 Introduction to the Axxess Server

1 Introduction to the Axxess Server 1 Introduction to the Axxess Server The Axxess Server is built on a highly reliable, very efficient, fast performing, multi-tasking, multi-user, multi-threading Linux operating system. The Axxess Server

More information

Cloud Video. Data Sheet

Cloud Video. Data Sheet Cloud Video Data Sheet 4net Technologies Cloud Video 4net s Cloud Video enables remote workers to simply and easily connect to standards-based videoconferencing systems, VoIP phones, ipad s, iphone s and

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

Revised: 14-Nov-07. Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0

Revised: 14-Nov-07. Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0 Revised: 14-Nov-07 Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0 2 / 16 This edition of the User Manual has been updated with information available at the date of issue. This edition supersedes

More information

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Course Description and Outline. IT Essential II: Network Operating Systems V2.0 Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs

More information

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

More information

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

Cisco Virtual Office Flexibility and Productivity for the Remote Workforce

Cisco Virtual Office Flexibility and Productivity for the Remote Workforce Cisco Virtual Office Flexibility and Productivity for the Remote Workforce Cisco Virtual Office Overview Q. What is the Cisco Virtual Office? A. The Cisco Virtual Office solution provides secure, rich

More information

This chapter describes how to set up and manage VPN service in Mac OS X Server.

This chapter describes how to set up and manage VPN service in Mac OS X Server. 6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

Computer Networks & Security 2014/2015

Computer Networks & Security 2014/2015 Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Post-Class Quiz: Telecommunication & Network Security Domain

Post-Class Quiz: Telecommunication & Network Security Domain 1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which

More information

Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009

Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009 Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009 Gregory Fresnais gfresnais@bpointsys.com +33672510922 Director of International Business Development BreakingPoint Systems

More information

Networked AV Systems Pretest

Networked AV Systems Pretest Networked AV Systems Pretest Instructions Choose the best answer for each question. Score your pretest using the key on the last page. If you miss three or more out of questions 1 11, consider taking Essentials

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

EDA 1200 4.3 Training Programs. Catalog of Course Descriptions

EDA 1200 4.3 Training Programs. Catalog of Course Descriptions EDA 1200 4.3 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 ACCESS NETWORKS, AN OVERVIEW...4 CORE NETWORKS, AN OVERVIEW...6 EDA 1200 4.3 INSTALLATION AND

More information

Voice over IP Basics for IT Technicians

Voice over IP Basics for IT Technicians Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

IxLoad: Testing Microsoft IPTV

IxLoad: Testing Microsoft IPTV IxLoad: Testing Microsoft IPTV IxLoad provides a comprehensive solution for validating service delivery networks utilizing Microsoft IPTV. IxLoad offers a complete solution that simulates core systems

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6)

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6) Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6) Content Page Introduction 2 Platform support 2 Cross Platform support 2 Web and file browsing 2 Client-side Applets

More information

IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks

IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks IxLoad is a highly scalable solution for accurately assessing the performance of content-aware devices and networks. IxLoad

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

Skype network has three types of machines, all running the same software and treated equally:

Skype network has three types of machines, all running the same software and treated equally: What is Skype? Why is Skype so successful? Everybody knows! Skype is a P2P (peer-to-peer) Voice-Over-IP (VoIP) client founded by Niklas Zennström and Janus Friis also founders of the file sharing application

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). 1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).

More information

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------

More information

IxLoad TM Adobe HDS Player Emulation

IxLoad TM Adobe HDS Player Emulation IxLoad TM Adobe HDS Player Emulation HTTP Dynamic Streaming (HDS) is a solution developed by Adobe Systems to playback high quality live and on-demand content. The playback uses HTTP for streaming fragmented

More information

Copyright 2006 Comcast Communications, Inc. All Rights Reserved.

Copyright 2006 Comcast Communications, Inc. All Rights Reserved. ii Copyright 2006 Comcast Communications, Inc. All Rights Reserved. Comcast is a registered trademark of Comcast Corporation. Comcast Business IP Gateway is a trademark of Comcast Corporation. The Comcast

More information

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods The Internet and its Protocols Protocol Specification & Design Robert Elz kre@munnari.oz.au kre@coe.psu.ac.th http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???)

More information

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere

More information

Application Note. Onsight Mobile Collaboration Video Endpoint Interoperability v5.0

Application Note. Onsight Mobile Collaboration Video Endpoint Interoperability v5.0 Application Note Onsight Mobile Collaboration Video Endpoint Interoperability v5. Onsight Mobile Collaboration Video Endpoint Interoperability... 3 Introduction... 3 Adding Onsight to a Video Conference

More information

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop

More information

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,

More information

Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0

Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0 Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0 Ports 2 Virtualization Experience Media Engine 2 Virtualization Experience Client Manager 3 Cisco Jabber

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

Application Note. Onsight Connect Network Requirements V6.1

Application Note. Onsight Connect Network Requirements V6.1 Application Note Onsight Connect Network Requirements V6.1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview... 3 1.2 Onsight Connect Servers... 4 Onsight Connect Network

More information

VIDEOCONFERENCING. Video class

VIDEOCONFERENCING. Video class VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information