life is simple, Enjoy it!!

Friday, 27 June 2014

10 Protokol Aplikasi

“10 Protokol Aplikasi”

5550 : Hewlett-Packard Data Protector (TCP)
HP Data Protector software is automated backup and recovery software for single-server to enterprise environments, supportingdisk storage or tape storage targets.
It provides cross-platform, online backup of data for Microsoft Windows, Unix, and Linuxoperating systems.
For business- and mission-critical applications, HP Data Protector Zero Downtime Backup leverages array-based solutions to offload processing from the server and perform backup operations on a copy of the production data. HP Data Protector Instant Recovery retrieves data from the replicated images on disk for recovery to specific points in time.
HP Data Protector originated as OmniBack. The last version to use the OmniBack name was version 4.1, which was retired in 2004.
47808 : BACnet Building Automation and Control Networks (4780810 = BAC016), commonly spills to 47809–47816 (UDP)

BACnet

BACnet, the ASHRAE building automation and control networking protocol, has been designed specifically to meet the communication needs of building automation and control systems for applications such as heating, ventilating, and air-conditioning control, lighting control, access control, and fire detection systems. The BACnet protocol provides mechanisms by which computerized equipment of arbitrary function may exchange information, regardless of the particular building service it performs. As a result, the BACnet protocol may be used by head-end computers, general-purpose direct digital controllers, and application specific or unitary controllers with equal effect.
The BACnet protocol specifies transport over a number of datalink layers including ARCNET, MS/TP (RS-485), PTP (RS-232), LonTalk, and Ethernet. BACnet also specifies communication over UDP/IP which is known as BACnet/IP. Other datalink layers are proposed.
4730 : Gearman' job server
Gearman provides a generic application framework to farm out work to other machines or processes that are better suited to do the work. It allows you to do work in parallel, to load balance processing, and to call functions between languages. It can be used in a variety of applications, from high-availability web sites to the transport of database replication events. In other words, it is the nervous system for how distributed processing communicates. A few strong points about Gearman:
·         Open Source It’s free! (in both meanings of the word) Gearman has an active open source community that is easy to get involved with if you need help or want to contribute. Worried about licensing? Gearman is BSD.
·         Multi-language - There are interfaces for a number of languages, and this list is growing. You also have the option to write heterogeneous applications with clients submitting work in one language and workers performing that work in another.
·         Flexible - You are not tied to any specific design pattern. You can quickly put together distributed applications using any model you choose, one of those options being Map/Reduce.
·         Fast - Gearman has a simple protocol and interface with an optimized, and threaded, server written in C/C++ to minimize your application overhead.
·         Embeddable - Since Gearman is fast and lightweight, it is great for applications of all sizes. It is also easy to introduce into existing applications with minimal overhead.
·         No single point of failure - Gearman can not only help scale systems, but can do it in a fault tolerant way.
·         No limits on message size - Gearman supports single messages up to 4gig in size. Need to do something bigger? No problem Gearman can chunk messages.
·         Worried about scaling? - Don’t worry about it with Gearman. Craig’s List, Tumblr, Yelp, Etsy,… discover what others have known for years.

9009 : Pichat Server—Peer to peer chat software (TCP/UDP)
Pichat software was first published in 2002 by Mark Seuffert, it was influenced by chat programs such as IRC, ICQ and by peer-to-peer technologies. A web interface was added in 2004 based on an earlier prototype from 1998. The chat is written in the C++ programming language. New functionality is developed together with David Fehrmann since 2010. Pichat is mainly used in Europe. Main purpose of pichat Server is to chat with others.
5002 : Drobo Dashboard ( UDP )
The Drobo is the latest generation of the award-winning platform that started it all. It holds true to the unique design and simplicity that has made Drobo the best desktop storage solution for storing and protecting all your data. No storage expertise is required to ensure your data is always safe and protected.
Inside every Drobo is the revolutionary BeyondRAID storage technology that protects data against a hard disk crash, yet is simple enough for anyone to use. As long as you have more than a single disk in Drobo, all data on Drobo is safe no matter which hard disk fails. There’s no need to worry about anything else.

9092 : H2 (DBMS) Database Server (TCP)
H2 is a relational database management system written in Java. It can be embedded in Java applications or run in the client-server mode. The disk footprint (size of the jar file) is about 1.5 MB.
The software is available as open source software under modified versions of the Mozilla Public License or the original Eclipse Public License. The modification of the MPL is a shorter file header and the license name.

Main features

A subset of the SQL (Structured Query Language) standard is supported. The main programming APIs are SQL and JDBC, however the database also supports using the Postgre SQL ODBC driver by acting like a Postgre SQL server.
It is possible to create both in-memory tables, as well as disk-based tables. Tables can be persistent or temporary. Index types are hash table and tree for in-memory tables, and b-tree for disk-based tables. All data manipulation operations are transactional. Table level locking and multi-version concurrency control are implemented. The 2-phase commit protocol is supported as well, but no standard API for distributed transactions is implemented. The security features of the database are: role based access rights, encryption of the password using SHA-256 and data using the AES or the Tiny Encryption Algorithm, XTEA. The cryptographic features are available as functions inside the database as well.SSL / TLS connections are supported in the client-server mode, as well as when using the console application.
Two full text search implementations are included, a native implementation and one using Lucene.
A simple form of high availability is implemented: when used in the client-server mode, the database engine supports hot failover (this is commonly known as clustering). However, the clustering mode must be enabled manually after a failure.
The database supports protection against SQL injection by enforcing the use of parameterized statements. In H2, this feature is called 'disabling literals'.
Since version 1.1.111, H2 in-memory database can run inside the Google App Engine.

24554 : BINKP, Fidonet mail transfers over TCP/IP ( TCP/UDP )
binkp is a protocol for transferring FidoNet mail over reliable connections.

Application of the Protocol

Historically, Fidonet traffic was transferred mainly over serial (RS-232) modem connections which might not have an error correction layer. These dial-up-oriented protocols for transferring Fidonet traffic like EMSI or Zmodem had to implement error-recovery. When the members of Fidonet started to use TCP/IP to transfer Fidonet traffic, this error-recovery overhead became unnecessary. Assuming that the connection is reliable makes it possible to eliminate error-checking and unnecessary synchronization steps, achieving both ease of implementation and improved performance. The major advantage of binkp vs EMSI and Zmodem is achieved over connections with large delays and low bandwidth.
IANA (Internet Assigned Numbers Authority) has registered the port number 24554 for binkp when used over TCP/IP connections
33434 : traceroute (TCP/UDP)
In computing, traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network. 
Most implementations include at least options to specify the number of queries to send per hop, time to wait for a response, the hop limit and port to use. Invoking traceroutewith no specified options displays the list of available options, while man traceroute presents more details, including the displayed error flags. Simple example on Linux:
$ traceroute -w 3 -q 1 -m 16 example.com
In the example above, selected options are to wait for three seconds (instead of five), send out only one query to each hop (instead of three), limit the maximum number of hops to 16 before giving up (instead of 30), with example.com as the final host.
This can help identify incorrect routing table definitions or firewalls that may be blocking ICMP traffic, or high port UDP in Unix ping, to a site. Note that a firewall may permit ICMP packets but not permit packets of other protocols.
Traceroute is also used by penetration testers to gather information about network infrastructure and IP ranges around a given host.
It can also be used when downloading data, and if there are multiple mirrors available for the same piece of data, one can trace each mirror to get a good idea of which mirror would be the fastest to use.

9191 : Sierra Wireless Airlink (TCP)
Sierra Wireless is the global leader in machine-to-machine (M2M) devices and cloud services, delivering intelligent wireless solutions that simplify the connected world. We offer the industry’s most comprehensive portfolio of 2G, 3G and 4G embedded modules and gateways, seamlessly integrated with our secure M2M cloud services. Customers worldwide, including OEMs, enterprises, and mobile network operators, trust our innovative solutions to get their connected products and s

No comments:

Post a Comment