answersLogoWhite

0

FTP, Telnet, Simple Mail Transfer Protocol (SMTP), HTTP, Post Office Protocol 3 (POP3), internet Message Access Protocol (IMAPv4), Network Basic Input/OutputSystem (NetBIOS), Simple Network Management Protocol (SNMP)

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

What are the protocols that send and deliver mail?

An email message is created using a mail client program. This program then sends the message to a server. The server then forwards the message to the recipient's email server, where the message is then supplied to the recipient's email client. It's delivered using a server architectureBy L.S.


Which protocols can be seen using Network Monitor?

ICMP and ARP


What are the reason for using layered protocols?

maa chuda lo


Can a motherboard have more than one bus and different protocols?

A motherboard can have more than one bus and each using a different protocols.


Difference between engineering and technology?

Engineering is cause and technology is the effect. I mean to say that engineering is the art of using scientific principles to create new technologies. Example:-- Information Technology is the art using scientific principles and protocols to create various technoliges like (1)Web Technology using HTTP protocols (2)Internet Telephony (3)Wireless Technology using WAP protocols


What is a LAN using Internet based protocols?

I would have to say that its is call an Intranet.


Why can my dsi go on wifi but my games can't?

Are you using WPA security? While the DSi's browser can use WPA encryption, games cannot, they can only be played over WEP or unencrypted connections.


What do encryption and decryption describe?

Encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge.Decryption is to make the encrypted information readable again, to make unencrypted.


How does LogMeIn encrypt transmissions?

LogMeln encrypts transmissions by using industry-standard algorithms and protocols to keep information completely safe. These standards and protocols and constantly reviewed by coders every day.


Can you help me write a sentence using the word blatant and includes context clues?

Your obvious mistruth is no more than a blatant lie.


How do nodes connect to each other?

There are many networking protocol basics. Nodes are connected using these protocols.


Do you have to connect to the wifi to use bluetooth?

No, they are entirely different interfaces using entirely different messaging protocols.