Aggregate Server Access Protocol | A protocol used to organize and access aggregate server information in a computer network. |
Asynchronous Layered Coding | A technique used in broadcasting to increase the robustness of broadcast channels, especially for the transmission of audio and video information. |
BEEP | The Blocks Extensible Exchange Protocol (BEEP) is a framework for creating network application protocols. |
Berkeley r-commands | The Berkeley r-commands are a suite of computer programs designed to enable users of one Unix system to log in or issue commands to another Unix computer via a network connection. |
Bidirectional Forwarding Detection | A protocol used to detect faults in the bidirectional path between two forwarding engines, including interfaces, data link(s), and to the extent possible, the forwarding engines themselves. |
Binkp | Binkp is a Fidonet mailer protocol designed to transfer netmail and echomail via TCP/IP networks. |
Bootstrap Protocol | A computer networking protocol used in Internet Protocol networks to automatically assign an IP address to network devices from a configuration server. |
Border Gateway Multicast Protocol | A protocol used to exchange multicast routing information among routers in a computer network. |
Border Gateway Protocol | The protocol backing the core routing decisions on the Internet, designed to exchange routing and reachability information among autonomous systems (AS) on the Internet. |
Bridging Systems Interface | A standard for bridging the gap between non-compatible protocols or physical layer implementations in a network. |
Certificate Management over CMS | A protocol used to manage public key certificates and certificate revocation lists (CRLs) in a Public Key Infrastructure (PKI). |
Certificate Management Protocol | An Internet protocol used to obtain X.509 digital certificates in a public key infrastructure (PKI). |
Challenge-Handshake Authentication Protocol | An authentication protocol used to validate identity through a three-way handshake. |
Clearinghouse for Networked Information Discovery and Retrieval | A protocol to create an Internet-scale distributed digital library. |
Common Indexing Protocol | A protocol that facilitates the sharing of index information among search engines to create search federations. |
Common Open Policy Service | A protocol that allows an application to communicate policy information with a policy server. |
Compiled Wireless Markup Language | A binary form of Wireless Markup Language (WML), intended to save transmission time. |
Connection-oriented communication | A network communication mode in telecommunications and computer networking, where a communication session or a semi-permanent connection is established before any useful data can be transferred. |
Connectionless communication | A data transmission method used in packet-switched networks, where each data unit is individually addressed and routed based on the destination address in its header. |
Constrained Shortest Path First | An optimization of Open Shortest Path First (OSPF) protocol, used to compute the shortest path constrained by several (e.g., QoS) parameters. |
Cookie exchange | The process of sending a cookie from the server to the client and then back again. Used to maintain a stateful session. |
Diameter Credit-Control Application | A Diameter application that provides a framework for real-time charging systems in IP-based service environments. |
DICT | A protocol created for the purpose of retrieving word definitions from a set of natural language dictionary databases. |
Directory Assistance Service | A service provided by phone companies that allows the user to find out a specific telephone number and/or address of a residence, business, or government entity. |
DIXIE | An obsolete protocol that provided lightweight access to X.500 directory services. |
DNS over HTTPS | A protocol for performing remote Domain Name System (DNS) resolution via the HTTPS protocol. |
DNS over TLS | A security protocol for encrypting and wrapping Domain Name System (DNS) queries and answers via the Transport Layer Security (TLS) protocol. |
DNSCrypt | A protocol for securing communications between a client and a DNS resolver, preventing DNS spoofing. |
Endpoint Handlespace Redundancy Protocol | A networking protocol for redundant or fault-tolerant service of endpoints in handlespace. |
Ephemeral port | A short-lived transport protocol port for Internet Protocol (IP) communications allocated automatically from a predefined range by the IP software. |
Extensible Name Service | A decentralized, distributed, open network protocol for storing and looking up data in a decentralized distributed database. |
Exterior gateway protocol | A type of protocol used to exchange routing information between routers in different autonomous systems. |
Exterior Gateway Protocol | A deprecated routing protocol for the Internet. |
External Data Representation | A standard data serialization format used for transferring data between a host and a guest computer. |
Fast and Secure Protocol | A protocol used to optimize data transfer over high-speed, high-latency networks. |
Fibre Channel over IP | A tunneling protocol used to connect Fibre Channel networks over IP-based networks. |
File eXchange Protocol | A protocol used to exchange files over the Internet, not to be confused with FTP. |
Finger (protocol) | A service protocol in the Internet suite of protocols for a client to request information about particular users of a specified networked computer. |
First-hop redundancy protocol | A type of protocol used in computer networking to provide redundancy for IP networks. |
Fast Local Internet Protocol | A protocol designed to route network packets more efficiently. |
Forward-confirmed reverse DNS | A network diagnostic tool for verifying the IP address of a host matches the hostname. |
Gemini (protocol) | A lightweight, collaboratively designed protocol, striving to exist between Gopher and the Web as a “small Internet”. |
GENA | General Event Notification Architecture (GENA) is a general-purpose protocol for passing HTTP-encapsulated notifications among networked entities. |
Geo URI scheme | A URI scheme for geographic locations using the ‘geo’ prefix. |
GNTP | Growl Network Transport Protocol, a protocol for notifications used by the Growl notification system on Mac OS X. |
GPSoverIP | A protocol for sending and receiving GPS data over the Internet. |
Handle System | A system for uniquely naming digital resources on the Internet. |
High Frequency Internet Protocol | A protocol used for Internet over high-frequency radio. |
HMAC-based one-time password | An algorithm for creating one-time passwords from a shared secret key and a moving factor. |
Host Identity Protocol | A host identification protocol for Internet Protocol networks. |
Host model | A description of the roles of hosts and networks in computer networks. |
Host Monitoring Protocol | An Internet protocol that provides a way to monitor the status of TCP/IP hosts. |
HTTP | The Hypertext Transfer Protocol is the foundation of any data exchange on the Web. |
HTTP message body | The part of an HTTP message that carries the body of the request or response. |
ICMP Router Discovery Protocol | A protocol that allows a host to discover the IP addresses of operational routers on its subnet. |
ICMPv6 | The implementation of the Internet Control Message |
Ident protocol | A TCP/IP protocol that allows a server to request identification from a client. |
Identifier-Locator Network Protocol | A networking protocol used to separate the functionality of an IP address into two namespaces: one for identity and one for location. |
IGMP snooping | A process of listening to Internet Group Management Protocol (IGMP) network traffic to control delivery of IP multicasts. |
TCP/IP Illustrated | This is a book series and not a protocol. |
Internationalized Resource Identifier | A version of the Uniform Resource Identifier (URI) that supports Unicode, enabling the representation of international character sets. |
Internet 0 | A concept for extending the Internet to even smaller devices, and not a protocol in itself. |
Internet chess server | More of a type of server than a protocol itself. It provides a place for real-time chess games to be played online. |
Internet Content Adaptation Protocol | A protocol aimed at providing open, standard-based interoperability of data transformation and optimization proxies. |
Internet Control Message Protocol | A supporting protocol in the Internet protocol suite used by network devices to send error messages and operational information. |
Internet Fibre Channel Protocol | A protocol for transporting Fibre Channel frames over IP networks. |
Internet Group Management Protocol | A communications protocol used by hosts and adjacent routers to establish multicast group memberships. |
Internet Group Management Protocol with Access Control | An extension of the Internet Group Management Protocol (IGMP) with additional security features. |
Internet Imaging Protocol | A protocol for sending and receiving bitmap images over the Internet. |
Internet Open Trading Protocol | A protocol for online credit card payments. |
Internet Protocol Control Protocol | A supporting protocol in the Internet protocol suite that is used to configure, enable, and disable the IPv4 network layer protocol on a point-to-point connection. |
Internet Streaming Media Alliance | An organization, not a protocol. |
InterPlanetary File System | A protocol and network designed to create a content-addressable, peer-to-peer method of storing and sharing hypermedia in a distributed file system. |
IP camera | This refers to a type of digital video camera commonly employed for surveillance, and which, unlike analog closed-circuit television (CCTV) cameras, can send and receive data via a computer network and the Internet. |
IP Flow Information Export | A protocol that allows an IP device to send flow information to a collector. |
IP multicast | A method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. |
IPFC | An obsolete protocol which was designed to carry Fibre Channel frames over IP networks. |
IPsec | A protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet in a data stream. |
IPv9 (China) | A proposed upgrade to IPv6 by China. Details remain unclear. |
IS-IS | An OSI link-state routing protocol, operating at the network layer of the OSI model. |
Jughead (search engine) | A search engine system for the Gopher protocol. |
KA9Q | A public domain TCP/IP package for amateur radio. |
KAME project | A joint effort by six companies in Japan to provide a free IPv6 and IPsec (for both IPv4 and IPv6) stack for BSD variants. |
L2TPv3 | The version 3 of Layer 2 Tunneling Protocol, a protocol used to support the use of the public Internet to convey the data for a virtual private network. |
Layer 2 Tunneling Protocol | A tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of |
Link-local address | A network address that is valid only for communication within the network segment or the broadcast domain that the host is connected to. |
Local Exchange Trading Systems | A locally initiated, democratically organized, not-for-profit community enterprise that provides a community information service and records transactions of members exchanging goods and services. |
LocalTalk | A proprietary network protocol developed by Apple Inc. for their Macintosh computers. |
Locator Identifier Separation Protocol | A protocol for routing networks that separates the “identifier” and “locator” functions of IP addresses. |
LOOP (networking) | An obsolete protocol used for testing networking software. |
Media Gateway Control Protocol | A protocol used for controlling Voice over IP (VoIP) Gateways from external call control elements. |
Message Access Protocol | A mail access protocol offering a single interface for email, voicemail, and fax messages. |
Message Peer-to-Peer | An instant messaging protocol. |
Message Queue Telemetry Transport | A publish-subscribe-based “lightweight” messaging protocol for use on top of the TCP/IP protocol. |
Meta-Object Facility | A standard for model-driven engineering. |
Mobile IP | An Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address. |
Mobile IPv6 | The version of Mobile IP designed for IPv6. |
Multicast Listener Discovery | A component of the Internet Protocol Version 6 (IPv6) suite used in the operation of routers and hosts in an IPv6 network. |
Multicast Source Discovery Protocol | A protocol in the Internet Protocol Suite used by routers for multicast group management. |
Multicast VLAN Registration | A protocol to control multicast traffic in layer 2 networks, usually by making use of IGMP snooping information. |
Multihoming | A practice to increase the reliability of the Internet connection of an IP network. |
Multipurpose Transaction Protocol | A protocol for secure, reliable, transaction-oriented communication. |
Multiservice Switching Forum | A forum for promoting IP/MPLS-based architectures, specifications and interoperability in packet-based networks. |
Name/Finger protocol | An Internet protocol that provides a simple directory service. |
NAT traversal | Techniques that establish and maintain Internet protocol connections traversing network address translation (NAT) gateways. |
NDM Job Entry Subsystem | A component of the Network DataMover (NDM) product from Sterling Commerce. |
NetBIOS Frames | A protocol used for file sharing over a network. |
Network Audio System | A network-transparent, client–server audio system. |
Network News Transfer Protocol | An application protocol used for transporting Usenet news articles (netnews) between news servers and for reading and posting articles by end user client applications. |
Network News Transfer Protocol extension for Streaming Feeds | An extension of NNTP for streaming news feeds. |
Network Voice Protocol | An experimental protocol for packet-based voice communication. |
Open Archives Initiative Protocol for Metadata Harvesting | A protocol developed by the Open Archives Initiative, used for harvesting metadata descriptions of records in an |
Open Shortest Path First | A routing protocol for Internet Protocol (IP) networks which operates by using a link state routing (LSR) algorithm. |
Open Systems Interconnection | A conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. |
OpenVPN | A virtual private network (VPN) system that implements techniques to secure point-to-point and site-to-site connections. |
OSPF Not So Stubby Area | A type of area in the Open Shortest Path First (OSPF) routing protocol which allows for redistribution of external routes within a stub area. |
Outline (protocol) | A protocol for sharing small to moderate amounts of text, such as abstracts, summaries or introductions. |
Overnet | A decentralized peer-to-peer computer network, usually used for sharing large files. |
Packet Internet Groper | A diagnostic tool used in IP networks to test reachability of a host on the network and to measure the round-trip time for packets. |
Packet layer | In the OSI model of computer networking, the packet layer is a region of negotiation that mediates between the physical and logical layers. |
PANA | Protocol for carrying Authentication for Network Access, an Internet standards track protocol to carry EAP over IP networks. |
Partitioned Hello protocol for IS-IS | An extension to the IS-IS protocol to overcome limitations in partition repair mechanisms. |
Performance Enhancing Proxies | Systems designed to improve the performance of Internet applications over satellite links. |
Point-to-Point Protocol | A data link layer (layer 2) communications protocol used to establish a direct connection between two nodes. |
Point-to-Point Tunneling Protocol | A method for implementing virtual private networks. |
Port Control Protocol | A protocol for controlling how incoming IPv4 or IPv6 packets are forwarded by an upstream router. |
Post Office Protocol | An Internet standard protocol used by email clients to retrieve mail from a server. |
Preboot Execution Environment | A software environment that’s used to boot a computer using a network interface independent of available data storage devices or installed operating systems. |
Proxy Mobile IPv6 | An Internet Engineering Task Force standard protocol for network-based mobility management. |
Real-time Transport Protocol | A protocol for the transport of real-time data, including audio and video. |
Real-time Transport Protocol Control Protocol | A sister protocol of the RTP, used to monitor data delivery and provide minimal control and identification functionality. |
Remote Desktop Protocol | A proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. |
Remote Job Entry | A protocol for submitting jobs to mainframe computers from remote workstations, and retrieving the output from such jobs. |
Remote Procedure Call | A protocol that one program can use to request a service from a program located on another computer on a network. |
Request Tracker | An enterprise-grade issue tracking system. |
Resource Reservation Protocol | A transport layer protocol designed to reserve resources across a network for an integrated services Internet. |
Routing Information Protocol | A distance-vector routing protocol, which employs the hop count as a routing metric. |
RTP Control Protocol | A protocol that provides feedback on quality of service in data transmission and information about the participants in an on-going session. |
Secure Copy Protocol | A means of securely transferring computer files between a local host and a remote host or between two remote hosts. |
Secure Real-time Transport Protocol | A protocol that provides encryption, message authentication, integrity, and replay protection to the RTP data. |
Secure Shell | A cryptographic network protocol for operating network services securely over an unsecured |
Session Announcement Protocol | A protocol for broadcasting multicast session information. |
Session Description Protocol | A protocol for describing multimedia communication sessions for the purposes of session announcement, session invitation, and other forms of session initiation. |
Session Initiation Protocol | A signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services. |
Simple Mail Transfer Protocol | An Internet standard for email transmission across IP networks. |
Simple Network Management Protocol | An Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. |
Site Multihoming by IPv6 Intermediation | A protocol for improving the fault-tolerance of connections by using multiple IPv6 addresses for a host. |
Skinny Client Control Protocol | A proprietary terminal control protocol originally developed by Selsius Systems. |
SLIP (programming language) | A list processing language, not a protocol. |
SOCKS | An Internet protocol that exchanges network packets between a client and server through a proxy server. |
Stream Control Transmission Protocol | A transport-layer protocol, serving in a similar role as the popular protocols TCP and UDP. |
Subnetwork Access Protocol | A protocol used by the Novell IPX/SPX protocol stack. |
TCP Cookie Transactions | An extension to TCP that provides protection against denial of service (DoS) attacks. |
Transmission Control Protocol | One of the main protocols in the Internet protocol suite, providing reliable, ordered, and error-checked delivery of a stream of octets between applications running on hosts communicating over an IP network. |
Transport Layer Security | A cryptographic protocol designed to provide communications security over a computer network. |
TRILL (computing) | A computer networking protocol that enables multipathing in the data center. |
Trivial File Transfer Protocol | A simple, lock-step FTP that allows a client to get a file from or put a file onto a remote host. |
Tunneled data transport | A protocol for tunnelling network protocols to remote network locations through other network protocols. |
TURN (networking protocol) | A protocol that allows an element behind a network address translator (NAT) or firewall to receive incoming data over TCP or UDP connections. |
Unicast Reverse Path Forwarding | A feature in the network routers that helps to prevent spoofing attacks. |
Uniform Resource Identifier | A string of characters that unambiguously identifies a particular resource. |
Universal Plug and Play | A set of networking protocols that permits networked devices to seamlessly discover each other’s presence on the network. |
Virtual Router Redundancy Protocol | A protocol that allows several routers on a multiaccess link to utilize the same virtual IP address. |
Virtual Extensible LAN | A network virtualization technology that attempts to address the scalability problems associated with large cloud computing deployments. |
Whois | A query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource. |
Wireless Access Protocol | A secure specification that allows users to access information instantly via handheld wireless devices. |
X.25 | An ITU-T standard protocol suite for packet-switched wide area network (WAN) communication. |
Zero Configuration Networking | A set of technologies that automatically creates a usable computer network based on the Internet Protocol Suite. |
Zigbee | A high-level communication protocols used to create personal area networks with small, low-power digital radios. |