Aggregate Server Access ProtocolA protocol used to organize and access aggregate server information in a computer network.
Asynchronous Layered CodingA technique used in broadcasting to increase the robustness of broadcast channels, especially for the transmission of audio and video information.
BEEPThe Blocks Extensible Exchange Protocol (BEEP) is a framework for creating network application protocols.
Berkeley r-commandsThe Berkeley r-commands are a suite of computer programs designed to enable users of one Unix system to log in or issue commands to another Unix computer via a network connection.
Bidirectional Forwarding DetectionA protocol used to detect faults in the bidirectional path between two forwarding engines, including interfaces, data link(s), and to the extent possible, the forwarding engines themselves.
BinkpBinkp is a Fidonet mailer protocol designed to transfer netmail and echomail via TCP/IP networks.
Bootstrap ProtocolA computer networking protocol used in Internet Protocol networks to automatically assign an IP address to network devices from a configuration server.
Border Gateway Multicast ProtocolA protocol used to exchange multicast routing information among routers in a computer network.
Border Gateway ProtocolThe protocol backing the core routing decisions on the Internet, designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.
Bridging Systems InterfaceA standard for bridging the gap between non-compatible protocols or physical layer implementations in a network.
Certificate Management over CMSA protocol used to manage public key certificates and certificate revocation lists (CRLs) in a Public Key Infrastructure (PKI).
Certificate Management ProtocolAn Internet protocol used to obtain X.509 digital certificates in a public key infrastructure (PKI).
Challenge-Handshake Authentication ProtocolAn authentication protocol used to validate identity through a three-way handshake.
Clearinghouse for Networked Information Discovery and RetrievalA protocol to create an Internet-scale distributed digital library.
Common Indexing ProtocolA protocol that facilitates the sharing of index information among search engines to create search federations.
Common Open Policy ServiceA protocol that allows an application to communicate policy information with a policy server.
Compiled Wireless Markup LanguageA binary form of Wireless Markup Language (WML), intended to save transmission time.
Connection-oriented communicationA network communication mode in telecommunications and computer networking, where a communication session or a semi-permanent connection is established before any useful data can be transferred.
Connectionless communicationA data transmission method used in packet-switched networks, where each data unit is individually addressed and routed based on the destination address in its header.
Constrained Shortest Path FirstAn optimization of Open Shortest Path First (OSPF) protocol, used to compute the shortest path constrained by several (e.g., QoS) parameters.
Cookie exchangeThe process of sending a cookie from the server to the client and then back again. Used to maintain a stateful session.
Diameter Credit-Control ApplicationA Diameter application that provides a framework for real-time charging systems in IP-based service environments.
DICTA protocol created for the purpose of retrieving word definitions from a set of natural language dictionary databases.
Directory Assistance ServiceA service provided by phone companies that allows the user to find out a specific telephone number and/or address of a residence, business, or government entity.
DIXIEAn obsolete protocol that provided lightweight access to X.500 directory services.
DNS over HTTPSA protocol for performing remote Domain Name System (DNS) resolution via the HTTPS protocol.
DNS over TLSA security protocol for encrypting and wrapping Domain Name System (DNS) queries and answers via the Transport Layer Security (TLS) protocol.
DNSCryptA protocol for securing communications between a client and a DNS resolver, preventing DNS spoofing.
Endpoint Handlespace Redundancy ProtocolA networking protocol for redundant or fault-tolerant service of endpoints in handlespace.
Ephemeral portA short-lived transport protocol port for Internet Protocol (IP) communications allocated automatically from a predefined range by the IP software.
Extensible Name ServiceA decentralized, distributed, open network protocol for storing and looking up data in a decentralized distributed database.
Exterior gateway protocolA type of protocol used to exchange routing information between routers in different autonomous systems.
Exterior Gateway ProtocolA deprecated routing protocol for the Internet.
External Data RepresentationA standard data serialization format used for transferring data between a host and a guest computer.
Fast and Secure ProtocolA protocol used to optimize data transfer over high-speed, high-latency networks.
Fibre Channel over IPA tunneling protocol used to connect Fibre Channel networks over IP-based networks.
File eXchange ProtocolA protocol used to exchange files over the Internet, not to be confused with FTP.
Finger (protocol)A service protocol in the Internet suite of protocols for a client to request information about particular users of a specified networked computer.
First-hop redundancy protocolA type of protocol used in computer networking to provide redundancy for IP networks.
Fast Local Internet ProtocolA protocol designed to route network packets more efficiently.
Forward-confirmed reverse DNSA network diagnostic tool for verifying the IP address of a host matches the hostname.
Gemini (protocol)A lightweight, collaboratively designed protocol, striving to exist between Gopher and the Web as a “small Internet”.
GENAGeneral Event Notification Architecture (GENA) is a general-purpose protocol for passing HTTP-encapsulated notifications among networked entities.
Geo URI schemeA URI scheme for geographic locations using the ‘geo’ prefix.
GNTPGrowl Network Transport Protocol, a protocol for notifications used by the Growl notification system on Mac OS X.
GPSoverIPA protocol for sending and receiving GPS data over the Internet.
Handle SystemA system for uniquely naming digital resources on the Internet.
High Frequency Internet ProtocolA protocol used for Internet over high-frequency radio.
HMAC-based one-time passwordAn algorithm for creating one-time passwords from a shared secret key and a moving factor.
Host Identity ProtocolA host identification protocol for Internet Protocol networks.
Host modelA description of the roles of hosts and networks in computer networks.
Host Monitoring ProtocolAn Internet protocol that provides a way to monitor the status of TCP/IP hosts.
HTTPThe Hypertext Transfer Protocol is the foundation of any data exchange on the Web.
HTTP message bodyThe part of an HTTP message that carries the body of the request or response.
ICMP Router Discovery ProtocolA protocol that allows a host to discover the IP addresses of operational routers on its subnet.
ICMPv6The implementation of the Internet Control Message
Ident protocolA TCP/IP protocol that allows a server to request identification from a client.
Identifier-Locator Network ProtocolA networking protocol used to separate the functionality of an IP address into two namespaces: one for identity and one for location.
IGMP snoopingA process of listening to Internet Group Management Protocol (IGMP) network traffic to control delivery of IP multicasts.
TCP/IP IllustratedThis is a book series and not a protocol.
Internationalized Resource IdentifierA version of the Uniform Resource Identifier (URI) that supports Unicode, enabling the representation of international character sets.
Internet 0A concept for extending the Internet to even smaller devices, and not a protocol in itself.
Internet chess serverMore of a type of server than a protocol itself. It provides a place for real-time chess games to be played online.
Internet Content Adaptation ProtocolA protocol aimed at providing open, standard-based interoperability of data transformation and optimization proxies.
Internet Control Message ProtocolA supporting protocol in the Internet protocol suite used by network devices to send error messages and operational information.
Internet Fibre Channel ProtocolA protocol for transporting Fibre Channel frames over IP networks.
Internet Group Management ProtocolA communications protocol used by hosts and adjacent routers to establish multicast group memberships.
Internet Group Management Protocol with Access ControlAn extension of the Internet Group Management Protocol (IGMP) with additional security features.
Internet Imaging ProtocolA protocol for sending and receiving bitmap images over the Internet.
Internet Open Trading ProtocolA protocol for online credit card payments.
Internet Protocol Control ProtocolA supporting protocol in the Internet protocol suite that is used to configure, enable, and disable the IPv4 network layer protocol on a point-to-point connection.
Internet Streaming Media AllianceAn organization, not a protocol.
InterPlanetary File SystemA protocol and network designed to create a content-addressable, peer-to-peer method of storing and sharing hypermedia in a distributed file system.
IP cameraThis refers to a type of digital video camera commonly employed for surveillance, and which, unlike analog closed-circuit television (CCTV) cameras, can send and receive data via a computer network and the Internet.
IP Flow Information ExportA protocol that allows an IP device to send flow information to a collector.
IP multicastA method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission.
IPFCAn obsolete protocol which was designed to carry Fibre Channel frames over IP networks.
IPsecA protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet in a data stream.
IPv9 (China)A proposed upgrade to IPv6 by China. Details remain unclear.
IS-ISAn OSI link-state routing protocol, operating at the network layer of the OSI model.
Jughead (search engine)A search engine system for the Gopher protocol.
KA9QA public domain TCP/IP package for amateur radio.
KAME projectA joint effort by six companies in Japan to provide a free IPv6 and IPsec (for both IPv4 and IPv6) stack for BSD variants.
L2TPv3The version 3 of Layer 2 Tunneling Protocol, a protocol used to support the use of the public Internet to convey the data for a virtual private network.
Layer 2 Tunneling ProtocolA tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of
Link-local addressA network address that is valid only for communication within the network segment or the broadcast domain that the host is connected to.
Local Exchange Trading SystemsA locally initiated, democratically organized, not-for-profit community enterprise that provides a community information service and records transactions of members exchanging goods and services.
LocalTalkA proprietary network protocol developed by Apple Inc. for their Macintosh computers.
Locator Identifier Separation ProtocolA protocol for routing networks that separates the “identifier” and “locator” functions of IP addresses.
LOOP (networking)An obsolete protocol used for testing networking software.
Media Gateway Control ProtocolA protocol used for controlling Voice over IP (VoIP) Gateways from external call control elements.
Message Access ProtocolA mail access protocol offering a single interface for email, voicemail, and fax messages.
Message Peer-to-PeerAn instant messaging protocol.
Message Queue Telemetry TransportA publish-subscribe-based “lightweight” messaging protocol for use on top of the TCP/IP protocol.
Meta-Object FacilityA standard for model-driven engineering.
Mobile IPAn Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address.
Mobile IPv6The version of Mobile IP designed for IPv6.
Multicast Listener DiscoveryA component of the Internet Protocol Version 6 (IPv6) suite used in the operation of routers and hosts in an IPv6 network.
Multicast Source Discovery ProtocolA protocol in the Internet Protocol Suite used by routers for multicast group management.
Multicast VLAN RegistrationA protocol to control multicast traffic in layer 2 networks, usually by making use of IGMP snooping information.
MultihomingA practice to increase the reliability of the Internet connection of an IP network.
Multipurpose Transaction ProtocolA protocol for secure, reliable, transaction-oriented communication.
Multiservice Switching ForumA forum for promoting IP/MPLS-based architectures, specifications and interoperability in packet-based networks.
Name/Finger protocolAn Internet protocol that provides a simple directory service.
NAT traversalTechniques that establish and maintain Internet protocol connections traversing network address translation (NAT) gateways.
NDM Job Entry SubsystemA component of the Network DataMover (NDM) product from Sterling Commerce.
NetBIOS FramesA protocol used for file sharing over a network.
Network Audio SystemA network-transparent, client–server audio system.
Network News Transfer ProtocolAn application protocol used for transporting Usenet news articles (netnews) between news servers and for reading and posting articles by end user client applications.
Network News Transfer Protocol extension for Streaming FeedsAn extension of NNTP for streaming news feeds.
Network Voice ProtocolAn experimental protocol for packet-based voice communication.
Open Archives Initiative Protocol for Metadata HarvestingA protocol developed by the Open Archives Initiative, used for harvesting metadata descriptions of records in an
Open Shortest Path FirstA routing protocol for Internet Protocol (IP) networks which operates by using a link state routing (LSR) algorithm.
Open Systems InterconnectionA conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology.
OpenVPNA virtual private network (VPN) system that implements techniques to secure point-to-point and site-to-site connections.
OSPF Not So Stubby AreaA type of area in the Open Shortest Path First (OSPF) routing protocol which allows for redistribution of external routes within a stub area.
Outline (protocol)A protocol for sharing small to moderate amounts of text, such as abstracts, summaries or introductions.
OvernetA decentralized peer-to-peer computer network, usually used for sharing large files.
Packet Internet GroperA diagnostic tool used in IP networks to test reachability of a host on the network and to measure the round-trip time for packets.
Packet layerIn the OSI model of computer networking, the packet layer is a region of negotiation that mediates between the physical and logical layers.
PANAProtocol for carrying Authentication for Network Access, an Internet standards track protocol to carry EAP over IP networks.
Partitioned Hello protocol for IS-ISAn extension to the IS-IS protocol to overcome limitations in partition repair mechanisms.
Performance Enhancing ProxiesSystems designed to improve the performance of Internet applications over satellite links.
Point-to-Point ProtocolA data link layer (layer 2) communications protocol used to establish a direct connection between two nodes.
Point-to-Point Tunneling ProtocolA method for implementing virtual private networks.
Port Control ProtocolA protocol for controlling how incoming IPv4 or IPv6 packets are forwarded by an upstream router.
Post Office ProtocolAn Internet standard protocol used by email clients to retrieve mail from a server.
Preboot Execution EnvironmentA software environment that’s used to boot a computer using a network interface independent of available data storage devices or installed operating systems.
Proxy Mobile IPv6An Internet Engineering Task Force standard protocol for network-based mobility management.
Real-time Transport ProtocolA protocol for the transport of real-time data, including audio and video.
Real-time Transport Protocol Control ProtocolA sister protocol of the RTP, used to monitor data delivery and provide minimal control and identification functionality.
Remote Desktop ProtocolA proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection.
Remote Job EntryA protocol for submitting jobs to mainframe computers from remote workstations, and retrieving the output from such jobs.
Remote Procedure CallA protocol that one program can use to request a service from a program located on another computer on a network.
Request TrackerAn enterprise-grade issue tracking system.
Resource Reservation ProtocolA transport layer protocol designed to reserve resources across a network for an integrated services Internet.
Routing Information ProtocolA distance-vector routing protocol, which employs the hop count as a routing metric.
RTP Control ProtocolA protocol that provides feedback on quality of service in data transmission and information about the participants in an on-going session.
Secure Copy ProtocolA means of securely transferring computer files between a local host and a remote host or between two remote hosts.
Secure Real-time Transport ProtocolA protocol that provides encryption, message authentication, integrity, and replay protection to the RTP data.
Secure ShellA cryptographic network protocol for operating network services securely over an unsecured
Session Announcement ProtocolA protocol for broadcasting multicast session information.
Session Description ProtocolA protocol for describing multimedia communication sessions for the purposes of session announcement, session invitation, and other forms of session initiation.
Session Initiation ProtocolA signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services.
Simple Mail Transfer ProtocolAn Internet standard for email transmission across IP networks.
Simple Network Management ProtocolAn Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.
Site Multihoming by IPv6 IntermediationA protocol for improving the fault-tolerance of connections by using multiple IPv6 addresses for a host.
Skinny Client Control ProtocolA proprietary terminal control protocol originally developed by Selsius Systems.
SLIP (programming language)A list processing language, not a protocol.
SOCKSAn Internet protocol that exchanges network packets between a client and server through a proxy server.
Stream Control Transmission ProtocolA transport-layer protocol, serving in a similar role as the popular protocols TCP and UDP.
Subnetwork Access ProtocolA protocol used by the Novell IPX/SPX protocol stack.
TCP Cookie TransactionsAn extension to TCP that provides protection against denial of service (DoS) attacks.
Transmission Control ProtocolOne of the main protocols in the Internet protocol suite, providing reliable, ordered, and error-checked delivery of a stream of octets between applications running on hosts communicating over an IP network.
Transport Layer SecurityA cryptographic protocol designed to provide communications security over a computer network.
TRILL (computing)A computer networking protocol that enables multipathing in the data center.
Trivial File Transfer ProtocolA simple, lock-step FTP that allows a client to get a file from or put a file onto a remote host.
Tunneled data transportA protocol for tunnelling network protocols to remote network locations through other network protocols.
TURN (networking protocol)A protocol that allows an element behind a network address translator (NAT) or firewall to receive incoming data over TCP or UDP connections.
Unicast Reverse Path ForwardingA feature in the network routers that helps to prevent spoofing attacks.
Uniform Resource IdentifierA string of characters that unambiguously identifies a particular resource.
Universal Plug and PlayA set of networking protocols that permits networked devices to seamlessly discover each other’s presence on the network.
Virtual Router Redundancy ProtocolA protocol that allows several routers on a multiaccess link to utilize the same virtual IP address.
Virtual Extensible LANA network virtualization technology that attempts to address the scalability problems associated with large cloud computing deployments.
WhoisA query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource.
Wireless Access ProtocolA secure specification that allows users to access information instantly via handheld wireless devices.
X.25An ITU-T standard protocol suite for packet-switched wide area network (WAN) communication.
Zero Configuration NetworkingA set of technologies that automatically creates a usable computer network based on the Internet Protocol Suite.
ZigbeeA high-level communication protocols used to create personal area networks with small, low-power digital radios.
Internet Protocols Table