Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

protocols(5) [ultrix man page]

protocols(5)							File Formats Manual						      protocols(5)

       protocols - protocol name file

       The  file is an ASCII file that contains information regarding the known protocols used in the DARPA Internet.  For each protocol, a single
       line should be present with the following information:

       Official protocol name
       Protocol number

       Each name is separated from the next by a new line.  Items are separated by any number of blanks or tab characters or both.  A number  sign
       (#) indicates the beginning of a comment; characters up to the end of the line are not interpreted by routines that search the file.

       Protocol names can contain any printable character other than a field delimiter, newline, or comment character.

       The  database  may be distributed in a network by a naming service, such as Yellow Pages or BIND/Hesiod.  See the Guide to the Yellow Pages
       Services or the chapter on Hesiod in the Guide to the BIND/Hesiod Service for setup information.

See Also
       Guide to the BIND/Hesiod Service
       Guide to the Yellow Pages Service


Check Out this Related Man Page

getprotoent(3n) 														   getprotoent(3n)

       getprotoent, getprotobynumber, getprotobyname, setprotoent, endprotoent - get protocols entry

       #include <netdb.h>

       struct protoent *getprotoent()

       struct protoent *getprotobyname(name)
       char *name;

       struct protoent *getprotobynumber(proto)
       int proto;

       void setprotoent(stayopen)
       int stayopen;

       void endprotoent()

       The and subroutines each return a pointer to an object with the following structure containing the broken-out fields of a line in the data-
       struct	 protoent {
	    char *p_name;  /* official name of protocol */
	    char **p_aliases;	/* alias list */
	    long p_proto;  /* protocol number */

       The members of this structure are:

       p_name	  The official name of the protocol.

       p_aliases  A zero terminated list of alternate names for the protocol.

       p_proto	  The protocol number.

       If the stayopen flag on a subroutine is NULL, the protocols database is opened.	Otherwise the has the effect of  rewinding  the  protocols
       database.  The may be called to close the protocols database when processing is complete.

       The  subroutine	simply	reads the next line while and search until a matching name or proto number is found (or until EOF is encountered).
       The subroutine keeps a pointer in the database, allowing successive calls to be used to search the entire file.

       A call to must be made before a loop using in order to perform initialization and an must be used after the loop.  Both and make  calls	to

       All  information is contained in a static area so it must be copied if it is to be saved.  Only the Internet protocols are currently under-

       If YP is running, does not return the entries in any particular order.  See the Guide to the Yellow Pages Service for setup information.

       The services database may also be distributed using the BIND/Hesiod naming service.  See the Guide to  the  BIND/Hesiod	Service  for  more

Return Values
       Null pointer(0) returned on EOF or error.

See Also
       protocols(5), svc.conf(5)
       Guide to the BIND/Hesiod Service
       Guide to the Yellow Pages Service

Man Page

9 More Discussions You Might Find Interesting

1. IP Networking

Two G/Ws on one RTR

Hi everybody we r using cisco 7206 rtrs as our G/W rtrs the probs we r facing is we r not able to connect two G/Ws from different Service providers.what will be the reason for this problem ? whats the solution? did anybody faced the same probs if so pls help us to solve this probs. Regds n... (2 Replies)
Discussion started by: edwin_francis
2 Replies

2. UNIX for Dummies Questions & Answers

network protocols

Which network protocol is used by UNIX systems to make remote file systems appear as if they are local? (2 Replies)
Discussion started by: OLLERTON
2 Replies

3. UNIX for Dummies Questions & Answers


What protocol would be the best to use on a network with nt and unix servers and windows me clients? Can SMB protocol be used to implement large networks? What protocol can be used to make remote file systems appear as if they are local? Quite a few questions I know, any help would be... (1 Reply)
Discussion started by: jnash
1 Replies

4. IP Networking

define IP protocols on network

what method would I use to determine which IP protocols network (0 Replies)
Discussion started by: mar mar
0 Replies

5. Cybersecurity

Netfilter conntracking for P2P protocols (edonkey, bittorent...)

Hi everyone, I would like to allow multi users to access P2P networks, so I wonder if there's a way to tracking these kind of protocols with netfilter, and also compatibility with nat, like the module conntrack_ftp seems to do with the FTP protocol. Thanks guys. (0 Replies)
Discussion started by: nekkro-kvlt
0 Replies

6. IP Networking

what are L2,L3 protocols.

hello forum members, What are L2 and L3 Protocols and can u brief me a bit little ie to gain a basic knowledge. Thanks & Regards Rajkumar g (1 Reply)
Discussion started by: rajkumar_g
1 Replies

7. UNIX for Dummies Questions & Answers

Linux - how to turn on the the RIP (dynamic routing)

(3 Replies)
Discussion started by: samnyc
3 Replies

8. IP Networking

Source IP address field in RREP on DSR routing

Hello I have a question about routing in MANET using Dynamic Source Routing protocol. IN RFC4728 (DSR) in section "IP fields" of RREP (Route Reply) packet we have this: ok. I read in several books and also in rfc4728 that: when a source node (node that initiate route discovery process)... (1 Reply)
Discussion started by: acu281
1 Replies

9. AIX

How to disable insecure protocols?

Hello all, planning to secure AIX sever by disabling insecure protocols/cipher suites; got the below requirements from secuirty team. 1.configure the server to disable support for DES and IDEA cipher suites 2.disable insecure TLS/SSL protocol support Configure the server to... (4 Replies)
Discussion started by: Kumar7997
4 Replies