No process ID for listening ports

How can I have ports that are listening without processes being associated with them?

root@ldv002 # netstat -ltnup
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address               Foreign Address             State       PID/Program name
tcp        0      0 0.0.0.0:5600                0.0.0.0:*                   LISTEN      1949/esmd
tcp        0      0 0.0.0.0:6305                0.0.0.0:*                   LISTEN      3651/xinetd
tcp        0      0 127.0.0.1:199               0.0.0.0:*                   LISTEN      5408/snmpd
tcp        0      0 0.0.0.0:34540               0.0.0.0:*                   LISTEN      -
tcp        0      0 0.0.0.0:1006                0.0.0.0:*                   LISTEN      5488/rpc.statd
tcp        0      0 0.0.0.0:111                 0.0.0.0:*                   LISTEN      3087/portmap
tcp        0      0 0.0.0.0:21                  0.0.0.0:*                   LISTEN      3669/vsftpd
tcp        0      0 127.0.0.1:25                0.0.0.0:*                   LISTEN      3694/sendmail: acce
tcp        0      0 :::22                       :::*                        LISTEN      3634/sshd
udp        0      0 0.0.0.0:514                 0.0.0.0:*                               3044/syslogd
udp        0      0 0.0.0.0:161                 0.0.0.0:*                               5408/snmpd
udp        0      0 0.0.0.0:49471               0.0.0.0:*                               5408/snmpd
udp        0      0 0.0.0.0:68                  0.0.0.0:*                               2892/dhclient
udp        0      0 0.0.0.0:59742               0.0.0.0:*                               -
udp        0      0 0.0.0.0:1000                0.0.0.0:*                               5488/rpc.statd
udp        0      0 0.0.0.0:1003                0.0.0.0:*                               5488/rpc.statd
udp        0      0 0.0.0.0:111                 0.0.0.0:*                               3087/portmap

I have also tried:

root@ldv002 # lsof -i tcp:5600
COMMAND  PID USER   FD   TYPE DEVICE SIZE NODE NAME
esmd    1949 root    4u  IPv4 338848       TCP *:esmmanager (LISTEN)
[/root]
root@ldv002 # lsof -i tcp:34540
[/root]
root@ldv002 # lsof -i tcp:59742
[/root]
$ man netstat 
...
..
Active Internet connections (TCP, UDP, raw)
...
...
PID/Program name
       Slash-separated pair of the process id (PID) and process name of the process that owns the socket.  
       --program causes  this  column to  be  included.   You will also need superuser privileges to see this 
       information on sockets you don�t own.  This identification information is not yet available 
       for IPX sockets.
.....


Not sure !!

These ports were actually part of NFS.

I added this to /etc/modprobe.conf to control the ports used so i can exclude them from scans:

options lockd nlm_tcpport=<PORT> nlm_udpport=<PORT>