Gibbs, Mark
November 2000
Network World;11/13/2000, Vol. 17 Issue 46, p58
Trade Publication
Examines how a computer port works. Probe into the functions of a Transmission Control Protocol/Internet Protocol; Online list of standard port assignments; Normal response to a Synchronize sequence number request.


Related Articles

  • THOUGHTS ON PORTS. Gibbs, Mark // Network World;11/06/2000, Vol. 17 Issue 45, p50 

    Focuses on software for Transfer Control Protocol/Internet Protocol ports. Assignment of a numeric value used to identify each service process; Use of Netcat software for testing whether ports are enabled; Port scanner Nmap, an open source utility; Windows 9x/NT tool called WS_Ping ProPack from...

  • Surveying Port Scans and Their Detection Methodologies. Bhuyan, Monowar H.; Bhattacharyya, D.K.; Kalita, J.K. // Computer Journal;Oct2011, Vol. 54 Issue 10, p1565 

    Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of Internet protocol addresses to find vulnerable hosts to compromise. However, it is also useful for system administrators and other network defenders to detect port scans as possible...

  • Network Port Address Translation.  // Network Dictionary;2007, p338 

    An encyclopedia entry for "Network Port Address Translation" (NPAT) is presented. Also known as Port Address Translation (PAT), NPAT is a feature of a Network Address Translation (NAT) device that translates Internet Protocol (IP) addresses and Transmission Control Protocol (TCP) or User...

  • TCP and UDP Port Numbers.  // Network Protocols Handbook;2007, p293 

    Information on Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) port numbers from a chapter of the book "Network Protocols Handbook," Fourth Edition is presented. These numbers are designed to distinguish multiple applications running on a single device with one Internet...

  • Implementation of a Secured system with Roaming Server and Roaming Ports. Bharathi, R.; Sukanesh, R. // International Journal on Computer Science & Engineering;2011, Vol. 3 Issue 5, p1781 

    The main goal of this paper is to design and implement a secured system against Server hijacking, which leads to Denial of Service (DoS) [5] attacks. This system uses more than one server for providing security. But only one server will be active at a time. The inactive servers act as Roaming...

  • Dynamic Ports.  // Network Dictionary;2007, p167 

    A definition of the term "Dynamic Ports" is presented. It refers to one of the classes of the transmission control protocol/user datagram protocol (TCP/UDP), defined by IETF Internet Assigned Numbers Authority (IANA). Other classes of TCP/UDP are the Registered Ports and the Well Known Ports....

  • Network Port.  // Network Dictionary;2007, p338 

    An encyclopedia entry for "network port" is presented. A network port serves as an interface between a computer and the network in computer hardware, while in the context of wavelength routing, it is a port that tandems through the node. Also, it is a special number present in the header of a...

  • An Effective Solution to Reduce Count-to-Infinity Problem in Ethernet. Ganesh, D.; Vaddella, Venkata Rama Prasad // International Journal of Computer Science Issues (IJCSI);Jul2010, Vol. 7 Issue 4, p44 

    Ethernet is currently the most popular networking technology because of its high performance, low cost and ubiquity nature. Ethernets rely on the dynamic computation of a cycle-free active forwarding topology. For that it uses rapid spanning tree protocol. Unfortunately, it exhibits...

  • Net gives TCP/IP a second life. Sullivan, Kristina B. // PC Week;11/13/95 - Netweek, Vol. 12 Issue 45, pN9 

    Reports on the use of the TCP/IP transport protocol in corporate networks in the United States as a link to the Internet. Opportunity for people to gain access to both the Internet and legacy applications; Esker Inc.'s inclusion of a World Wide Web browser in its Tun Plus software; Areas...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics