List of RFCs
Encyclopedia
This is a partial list of RFCs
(request for comments memoranda).
While there are over 6000 RFCs, this list consists of RFCs that have related articles.
A complete list is available from the IETF website.
text.
struck-through text.
Request for Comments
In computer network engineering, a Request for Comments is a memorandum published by the Internet Engineering Task Force describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems.Through the Internet Society, engineers and...
(request for comments memoranda).
While there are over 6000 RFCs, this list consists of RFCs that have related articles.
A complete list is available from the IETF website.
Numerical list
Obsolete RFCs are indicated with strikethroughStrikethrough
Strikethrough is a typographical presentation of words with a horizontal line through their center. This is an example....
text.
# | Title | Date published | Related article | Obsoleted by | Notes |
---|---|---|---|---|---|
RFC 114 | |
April 16, 1971 | FTP File Transfer Protocol File Transfer Protocol is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server... |
959 | |
RFC 172 | |
June 23, 1971 | FTP File Transfer Protocol File Transfer Protocol is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server... |
265 | |
RFC 265 | |
November 17, 1971 | FTP File Transfer Protocol File Transfer Protocol is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server... |
354 | |
RFC 354 | |
July 8, 1972 | FTP File Transfer Protocol File Transfer Protocol is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server... |
542 | |
RFC 760 | |
January 1980 | IPv4 IPv4 Internet Protocol version 4 is the fourth revision in the development of the Internet Protocol and the first version of the protocol to be widely deployed. Together with IPv6, it is at the core of standards-based internetworking methods of the Internet... |
791 | |
RFC 765 | |
June 1980 | FTP File Transfer Protocol File Transfer Protocol is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server... |
959 | |
RFC 768 | User Datagram Protocol | August 28, 1980 | UDP User Datagram Protocol The User Datagram Protocol is one of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol network without requiring... |
||
RFC 783 | |
June 1981 | TFTP Trivial File Transfer Protocol Trivial File Transfer Protocol is a file transfer protocol known for its simplicity. It is generally used forautomated transfer of configuration or boot files between machines in a local environment.... |
1350 | |
RFC 790 | |
September 1981 | IPv4 IPv4 Internet Protocol version 4 is the fourth revision in the development of the Internet Protocol and the first version of the protocol to be widely deployed. Together with IPv6, it is at the core of standards-based internetworking methods of the Internet... |
820 | |
RFC 791 | Internet Protocol | September 1981 | IPv4 IPv4 Internet Protocol version 4 is the fourth revision in the development of the Internet Protocol and the first version of the protocol to be widely deployed. Together with IPv6, it is at the core of standards-based internetworking methods of the Internet... |
||
RFC 792 | INTERNET CONTROL MESSAGE PROTOCOL | September 1981 | ICMP Internet Control Message Protocol The Internet Control Message Protocol is one of the core protocols of the Internet Protocol Suite. It is chiefly used by the operating systems of networked computers to send error messages indicating, for example, that a requested service is not available or that a host or router could not be... |
||
RFC 793 | TRANSMISSION CONTROL PROTOCOL | September 1981 | TCP Transmission Control Protocol The Transmission Control Protocol is one of the core protocols of the Internet Protocol Suite. TCP is one of the two original components of the suite, complementing the Internet Protocol , and therefore the entire suite is commonly referred to as TCP/IP... |
||
RFC 821 | |
August 1982 | SMTP Simple Mail Transfer Protocol Simple Mail Transfer Protocol is an Internet standard for electronic mail transmission across Internet Protocol networks. SMTP was first defined by RFC 821 , and last updated by RFC 5321 which includes the extended SMTP additions, and is the protocol in widespread use today... |
2821 | |
RFC 822 | |
August 13, 1982 | 2822 | ||
RFC 826 | An Ethernet Address Resolution Protocol | November 1982 | ARP Address Resolution Protocol Address Resolution Protocol is a telecommunications protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks. ARP was defined by RFC 826 in 1982. It is Internet Standard STD 37... |
||
RFC 850 | |
June 1983 | Usenet Usenet Usenet is a worldwide distributed Internet discussion system. It developed from the general purpose UUCP architecture of the same name.Duke University graduate students Tom Truscott and Jim Ellis conceived the idea in 1979 and it was established in 1980... |
1036 | |
RFC 854 | TELNET PROTOCOL SPECIFICATION | May 1983 | Telnet TELNET Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection... |
||
RFC 855 | TELNET OPTION SPECIFICATIONS | May 1983 | |||
RFC 862 | Echo Protocol | May 1983 | Echo ECHO protocol The Echo Protocol is a service in the Internet Protocol Suite defined in RFC 862. It was originally proposed for testing and measurement of round-trip times in IP networks.... |
||
RFC 863 | Discard Protocol | May 1983 | DISCARD DISCARD The Discard Protocol is a service in the Internet Protocol Suite defined in RFC 863. It is intended for testing, debugging, and measurement purposes.... |
||
RFC 864 | Character Generator Protocol | May 1983 | CHARGEN CHARGEN The Character Generator Protocol is a service of the Internet Protocol Suite defined in RFC 864 in 1983 by Jon Postel. It is intended for testing, debugging, and measurement purposes.... |
||
RFC 868 | Time Protocol | May 1983 | TIME TIME protocol The Time Protocol is a network protocol in the Internet Protocol Suite defined in 1983 in RFC 868. Its purpose is to provide a site-independent, machine readable date and time.... |
||
RFC 903 | A Reverse Address Resolution Protocol | June 1984 | RARP Reverse Address Resolution Protocol The Reverse Address Resolution Protocol is an obsolete computer networking protocol used by a host computer to request its Internet Protocol address from an administrative host, when it has available its Link Layer or hardware address, such as a MAC address.RARP is described in Internet... |
||
RFC 918 | |
October 1984 | POP Post Office Protocol In computing, the Post Office Protocol is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP and IMAP are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern... v 1 |
937 | |
RFC 937 | POST OFFICE PROTOCOL - VERSION 2 | February 1985 | POP Post Office Protocol In computing, the Post Office Protocol is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP and IMAP are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern... v 2 |
||
RFC 951 | BOOTSTRAP PROTOCOL (BOOTP) | September 1985 | BOOTP BOOTP In computer networking, the Bootstrap Protocol, or BOOTP, is a network protocol used by a network client to obtain an IP address from a configuration server. The BOOTP protocol was originally defined in RFC 951.... |
||
RFC 959 | FILE TRANSFER PROTOCOL (FTP) | October 1985 | FTP File Transfer Protocol File Transfer Protocol is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server... |
||
RFC 966 | |
December 1985 | IGMP Internet Group Management Protocol The Internet Group Management Protocol is a communications protocol used by hosts and adjacent routers on IP networks to establish multicast group memberships.... v 0 |
988 | |
RFC 977 | |
February 1986 | NNTP Network News Transfer Protocol The Network News Transfer Protocol is an Internet application protocol used for transporting Usenet news articles between news servers and for reading and posting articles by end user client applications... |
3977 | |
RFC 988 | |
July 1986 | IGMP Internet Group Management Protocol The Internet Group Management Protocol is a communications protocol used by hosts and adjacent routers on IP networks to establish multicast group memberships.... v 0 |
1054, 1112 | |
RFC 1034 | DOMAIN NAMES - CONCEPTS AND FACILITIES | November 1987 | DNS Domain name system The Domain Name System is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities... |
||
RFC 1035 | DOMAIN NAMES - IMPLEMENTATION AND SPECIFICATION | November 1987 | DNS Domain name system The Domain Name System is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities... |
||
RFC 1036 | Standard for Interchange of USENET Messages | December 1987 | Usenet Usenet Usenet is a worldwide distributed Internet discussion system. It developed from the general purpose UUCP architecture of the same name.Duke University graduate students Tom Truscott and Jim Ellis conceived the idea in 1979 and it was established in 1980... |
||
RFC 1054 | |
May 1988 | IGMP Internet Group Management Protocol The Internet Group Management Protocol is a communications protocol used by hosts and adjacent routers on IP networks to establish multicast group memberships.... v 1 |
1112 | |
RFC 1058 | Routing Information Protocol | June 1988 | RIP Routing Information Protocol The Routing Information Protocol is a distance-vector routing protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15.... v 1 |
||
RFC 1059 | Network Time Protocol (version 1) specification and implementation | July 1988 | NTP Network Time Protocol The Network Time Protocol is a protocol and software implementation for synchronizing the clocks of computer systems over packet-switched, variable-latency data networks. Originally designed by David L... v 1 |
||
RFC 1067 | |
August 1988 | SNMP Simple Network Management Protocol Simple Network Management Protocol is an "Internet-standard protocol for managing devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more." It is used mostly in network management systems to monitor... v1 |
1098 | |
RFC 1071 | |
September 1988 | Checksum Checksum A checksum or hash sum is a fixed-size datum computed from an arbitrary block of digital data for the purpose of detecting accidental errors that may have been introduced during its transmission or storage. The integrity of the data can be checked at any later time by recomputing the checksum and... |
1141 | |
RFC 1081 | |
November 1988 | POP Post Office Protocol In computing, the Post Office Protocol is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP and IMAP are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern... v 3 |
1225 | |
RFC 1087 | Ethics and the Internet | January 1989 | Internet Ethics Internet ethics In January 1989 the Internet Architecture Board issued a statement of policy concerning Internet ethics. This document is referred to as RFC 1087 'Ethics and the Internet'.An extract of RFC 1087 follows:... |
||
RFC 1094 | |
March 1989 | NFS | 3010 | |
RFC 1098 | |
April 1989 | SNMP Simple Network Management Protocol Simple Network Management Protocol is an "Internet-standard protocol for managing devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more." It is used mostly in network management systems to monitor... v1 |
1157 | |
RFC 1112 | |
August 1989 | IGMP Internet Group Management Protocol The Internet Group Management Protocol is a communications protocol used by hosts and adjacent routers on IP networks to establish multicast group memberships.... v 1 |
||
RFC 1119 | Network Time Protocol (version 2) specification and implementation | September 1989 | NTP Network Time Protocol The Network Time Protocol is a protocol and software implementation for synchronizing the clocks of computer systems over packet-switched, variable-latency data networks. Originally designed by David L... v 2 |
||
RFC 1131 | |
October 1989 | OSPF Open Shortest Path First Open Shortest Path First is an adaptive routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system . It is defined as OSPF Version 2 in RFC 2328 for IPv4... |
1247 | |
RFC 1149 | A Standard for the Transmission of IP Datagrams on Avian Carriers | April 1, 1990 | IP over Avian Carriers IP over Avian Carriers In computer networking, IP over Avian Carriers is a humorously intended proposal to carry Internet Protocol traffic by birds such as homing pigeons. IP over Avian Carriers was initially described in RFC 1149, a Request for Comments issued by the Internet Engineering Task Force written by D.... |
||
RFC 1157 | A Simple Network Management Protocol (SNMP) | May 1990 | SNMP Simple Network Management Protocol Simple Network Management Protocol is an "Internet-standard protocol for managing devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more." It is used mostly in network management systems to monitor... v1 |
||
RFC 1176 | INTERACTIVE MAIL ACCESS PROTOCOL - VERSION 2 | August 1990 | IMAP Internet Message Access Protocol Internet message access protocol is one of the two most prevalent Internet standard protocols for e-mail retrieval, the other being the Post Office Protocol... v 2 |
||
RFC 1225 | |
May 1991 | POP Post Office Protocol In computing, the Post Office Protocol is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP and IMAP are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern... v 3 |
1460 | |
RFC 1247 | |
July 1991 | OSPF Open Shortest Path First Open Shortest Path First is an adaptive routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system . It is defined as OSPF Version 2 in RFC 2328 for IPv4... |
1583 | |
RFC 1294 | |
January 1992 | Frame relay Frame relay Frame Relay is a standardized wide area network technology that specifies the physical and logical link layers of digital telecommunications channels using a packet switching methodology... |
||
RFC 1305 | Network Time Protocol (Version 3) Specification, Implementation and Analysis | March 1992 | NTP Network Time Protocol The Network Time Protocol is a protocol and software implementation for synchronizing the clocks of computer systems over packet-switched, variable-latency data networks. Originally designed by David L... v 3 |
||
RFC 1321 | The MD5 Message-Digest Algorithm | April 1992 | MD5 MD5 The MD5 Message-Digest Algorithm is a widely used cryptographic hash function that produces a 128-bit hash value. Specified in RFC 1321, MD5 has been employed in a wide variety of security applications, and is also commonly used to check data integrity... |
||
RFC 1350 | THE TFTP PROTOCOL (REVISION 2) | July 1992 | TFTP Trivial File Transfer Protocol Trivial File Transfer Protocol is a file transfer protocol known for its simplicity. It is generally used forautomated transfer of configuration or boot files between machines in a local environment.... |
||
RFC 1388 | |
January 1993 | RIP Routing Information Protocol The Routing Information Protocol is a distance-vector routing protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15.... |
1723, 2453 | |
RFC 1436 | The Internet Gopher Protocol | March 1993 | Gopher | ||
RFC 1441 | Introduction to version 2 of the Internet-standard Network Management Framework | April 1993 | SNMP Simple Network Management Protocol Simple Network Management Protocol is an "Internet-standard protocol for managing devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more." It is used mostly in network management systems to monitor... v 2 |
||
RFC 1459 | Internet Relay Chat Protocol | May 1993 | IRC Internet Relay Chat Internet Relay Chat is a protocol for real-time Internet text messaging or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message as well as chat and data transfer, including file... |
||
RFC 1460 | |
June 1993 | POP Post Office Protocol In computing, the Post Office Protocol is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP and IMAP are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern... v 3 |
1725 | |
RFC 1487 | |
July 1993 | LDAP Lightweight Directory Access Protocol The Lightweight Directory Access Protocol is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network... |
1777 | |
RFC 1490 | |
July 1993 | Frame relay Frame relay Frame Relay is a standardized wide area network technology that specifies the physical and logical link layers of digital telecommunications channels using a packet switching methodology... |
1294 | |
RFC 1508 | |
September 1993 | GSSAPI Generic Security Services Application Program Interface The Generic Security Services Application Program Interface is an application programming interface for programs to access security services.... |
2078 | |
RFC 1509 | |
2744 | |||
RFC 1531 | |
October 1993 | DHCP Dynamic Host Configuration Protocol The Dynamic Host Configuration Protocol is a network configuration protocol for hosts on Internet Protocol networks. Computers that are connected to IP networks must be configured before they can communicate with other hosts. The most essential information needed is an IP address, and a default... |
1541 | |
RFC 1541 | |
October 1993 | DHCP Dynamic Host Configuration Protocol The Dynamic Host Configuration Protocol is a network configuration protocol for hosts on Internet Protocol networks. Computers that are connected to IP networks must be configured before they can communicate with other hosts. The most essential information needed is an IP address, and a default... |
2131 | |
RFC 1583 | |
March 1994 | OSPF Open Shortest Path First Open Shortest Path First is an adaptive routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system . It is defined as OSPF Version 2 in RFC 2328 for IPv4... |
2178 | |
RFC 1631 | |
May 1994 | NAT Network address translation In computer networking, network address translation is the process of modifying IP address information in IP packet headers while in transit across a traffic routing device.... |
3022 | |
RFC 1723 | |
November 1994 | RIP Routing Information Protocol The Routing Information Protocol is a distance-vector routing protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15.... |
2453 | |
RFC 1725 | |
November 1994 | POP Post Office Protocol In computing, the Post Office Protocol is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP and IMAP are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern... v 3 |
1939 | |
RFC 1730 | INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4 | December 1994 | IMAP Internet Message Access Protocol Internet message access protocol is one of the two most prevalent Internet standard protocols for e-mail retrieval, the other being the Post Office Protocol... v 4 |
||
RFC 1774 | |
March 1995 | Border Gateway Protocol Border Gateway Protocol The Border Gateway Protocol is the protocol backing the core routing decisions on the Internet. It maintains a table of IP networks or 'prefixes' which designate network reachability among autonomous systems . It is described as a path vector protocol... |
4271 | |
RFC 1777 | Lightweight Directory Access Protocol | March 1995 | LDAP Lightweight Directory Access Protocol The Lightweight Directory Access Protocol is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network... |
||
RFC 1813 | |
June 1995 | NFS v 3 | 3010 | |
RFC 1855 | Netiquette Guidelines | October 1995 | Netiquette Netiquette Netiquette is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary... |
||
RFC 1883 | |
December 1995 | IPv6 IPv6 Internet Protocol version 6 is a version of the Internet Protocol . It is designed to succeed the Internet Protocol version 4... |
2460 | |
RFC 1889 | RTP: A Transport Protocol for Real-Time Applications | January 1996 | RTP Real-time Transport Protocol The Real-time Transport Protocol defines a standardized packet format for delivering audio and video over IP networks. RTP is used extensively in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications, television services and... |
||
RFC 1918 | Address Allocation for Private Internets | February 1996 | Private network Private network In the Internet addressing architecture, a private network is a network that uses private IP address space, following the standards set by RFC 1918 and RFC 4193. These addresses are commonly used for home, office, and enterprise local area networks , when globally routable addresses are not... |
||
RFC 1939 | Post Office Protocol - Version 3 | May 1996 | POP Post Office Protocol In computing, the Post Office Protocol is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP and IMAP are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern... v 3 |
||
RFC 1945 | Hypertext Transfer Protocol -- HTTP/1.0 | May 1996 | HTTP Hypertext Transfer Protocol The Hypertext Transfer Protocol is a networking protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web.... v 1.0 |
||
RFC 1948 | Defending Against Sequence Number Attacks | May 1996 | IP spoofing | ||
RFC 1950 | ZLIB Compressed Data Format Specification version 3.3 | May 1996 | Zlib Zlib zlib is a software library used for data compression. zlib was written by Jean-Loup Gailly and Mark Adler and is an abstraction of the DEFLATE compression algorithm used in their gzip file compression program. Zlib is also a crucial component of many software platforms including Linux, Mac OS X,... v 3.3 |
||
RFC 1951 | DEFLATE Compressed Data Format Specification version 1.3 | May 1996 | DEFLATE DEFLATE Deflate is a lossless data compression algorithm that uses a combination of the LZ77 algorithm and Huffman coding. It was originally defined by Phil Katz for version 2 of his PKZIP archiving tool and was later specified in RFC 1951.... v 1.3 |
||
RFC 1952 | GZIP file format specification version 4.3 | May 1996 | Gzip Gzip Gzip is any of several software applications used for file compression and decompression. The term usually refers to the GNU Project's implementation, "gzip" standing for GNU zip. It is based on the DEFLATE algorithm, which is a combination of Lempel-Ziv and Huffman coding... v 4.3 |
||
RFC 1964 | The Kerberos Version 5 GSS-API Mechanism | June 1996 | Kerberos; GSSAPI Generic Security Services Application Program Interface The Generic Security Services Application Program Interface is an application programming interface for programs to access security services.... |
||
RFC 1991 | PGP Message Exchange Formats | August 1996 | PGP Pretty Good Privacy Pretty Good Privacy is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions to increase the security... |
||
RFC 2058 | |
January 1997 | RADIUS RADIUS Remote Authentication Dial In User Service is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for computers to connect and use a network service... |
2138 | |
RFC 2059 | |
January 1997 | RADIUS RADIUS Remote Authentication Dial In User Service is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for computers to connect and use a network service... |
2139 | |
RFC 2060 | |
December 1996 | IMAP Internet Message Access Protocol Internet message access protocol is one of the two most prevalent Internet standard protocols for e-mail retrieval, the other being the Post Office Protocol... v 4r1 |
3501 | |
RFC 2078 | |
January 1997 | GSSAPI Generic Security Services Application Program Interface The Generic Security Services Application Program Interface is an application programming interface for programs to access security services.... v 2 |
2743 | |
RFC 2080 | RIPng for IPv6 | January 1997 | RIP Routing Information Protocol The Routing Information Protocol is a distance-vector routing protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15.... v ng |
||
RFC 2109 | |
February 1997 | HTTP cookie HTTP cookie A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to send state information to a user's browser and for the browser to return the state information to the origin site... |
2965 | |
RFC 2117 | |
June 1997 | PIM Protocol Independent Multicast Protocol-Independent Multicast is a family of multicast routing protocols for Internet Protocol networks that provide one-to-many and many-to-many distribution of data over a LAN, WAN or the Internet... |
2362 | |
RFC 2119 | Key words for use in RFCs to Indicate Requirement Levels | March 1997 | Request for Comments Request for Comments In computer network engineering, a Request for Comments is a memorandum published by the Internet Engineering Task Force describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems.Through the Internet Society, engineers and... |
||
RFC 2131 | Dynamic Host Configuration Protocol | March 1997 | DHCP Dynamic Host Configuration Protocol The Dynamic Host Configuration Protocol is a network configuration protocol for hosts on Internet Protocol networks. Computers that are connected to IP networks must be configured before they can communicate with other hosts. The most essential information needed is an IP address, and a default... |
||
RFC 2138 | |
April 1997 | RADIUS RADIUS Remote Authentication Dial In User Service is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for computers to connect and use a network service... |
2865 | |
RFC 2139 | |
April 1997 | RADIUS RADIUS Remote Authentication Dial In User Service is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for computers to connect and use a network service... |
2866 | |
RFC 2168 | |
June 1997 | DDDS Dynamic Delegation Discovery System Defined in RFC 3401, RFC 3402, RFC 3403, RFC 3404, and RFC 3405.From RFC 3401:The Dynamic Delegation Discovery System is used to implement lazy binding of strings to data, in order to support dynamically configured delegation systems... |
3401 | |
RFC 2177 | IMAP4 IDLE command | June 1997 | IMAP IDLE IMAP IDLE In e-mail technology, IDLE is an IMAP feature described in RFC 2177 that allows a client to indicate to the server that it is ready to accept real-time notifications.- Significance :... |
||
RFC 2178 | |
July 1997 | OSPF Open Shortest Path First Open Shortest Path First is an adaptive routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system . It is defined as OSPF Version 2 in RFC 2328 for IPv4... v 2 |
2328 | |
RFC 2195 | IMAP/POP AUTHorize Extension for Simple Challenge/Response | September 1997 | CRAM-MD5 CRAM-MD5 In cryptography, CRAM-MD5 is achallenge-response authentication mechanism defined in RFC 2195 based on theHMAC-MD5 MACalgorithm... |
||
RFC 2222 | |
October 1997 | SASL Simple Authentication and Security Layer Simple Authentication and Security Layer is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols, in theory allowing any authentication mechanism supported by SASL to be used in any application protocol that uses... |
4422 | |
RFC 2228 | FTP Security Extensions | October 1997 | FTP File Transfer Protocol File Transfer Protocol is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server... |
||
RFC 2236 | |
November 1997 | IGMP Internet Group Management Protocol The Internet Group Management Protocol is a communications protocol used by hosts and adjacent routers on IP networks to establish multicast group memberships.... v 2 |
3376 | |
RFC 2246 | The TLS Protocol Version 1.0 | January 1999 | TLS Transport Layer Security Transport Layer Security and its predecessor, Secure Sockets Layer , are cryptographic protocols that provide communication security over the Internet... 1.0 |
||
RFC 2251 | Lightweight Directory Access Protocol (v3) | December 1997 | LDAP Lightweight Directory Access Protocol The Lightweight Directory Access Protocol is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network... |
||
RFC 2252 | Lightweight Directory Access Protocol (v3): Attribute Syntax Definitions | ||||
RFC 2253 | Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Distinguished Names | ||||
RFC 2254 | The String Representation of LDAP Search Filters | ||||
RFC 2255 | The LDAP URL Format | ||||
RFC 2256 | A Summary of the X.500(96) User Schema for use with LDAPv3 | ||||
RFC 2326 | Real Time Streaming Protocol (RTSP) | April 1998 | RTSP Real Time Streaming Protocol The Real Time Streaming Protocol is a network control protocol designed for use in entertainment and communications systems to control streaming media servers. The protocol is used for establishing and controlling media sessions between end points... |
||
RFC 2327 | SDP: Session Description Protocol | April 1998 | SDP Session Description Protocol The Session Description Protocol is a format for describing streaming media initialization parameters. The IETF published the original specification as an IETF Proposed Standard in April 1998, and subsequently published a revised specification as an IETF Proposed Standard as RFC 4566 in July... |
||
RFC 2328 | OSPF Version 2 | April 1998 | OSPF Open Shortest Path First Open Shortest Path First is an adaptive routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system . It is defined as OSPF Version 2 in RFC 2328 for IPv4... |
||
RFC 2351 | Mapping of Airline Reservation, Ticketing, and Messaging Traffic over IP | May 1998 | MATIP Mapping of Airline Traffic over Internet Protocol MATIP stands for Mapping of Airline Traffic over TCP/IP.MATIP is preferred over classic Airline Traffic lines because... |
||
RFC 2362 | Protocol Independent Multicast-Sparse Mode (PIM-SM) | June 1998 | PIM Protocol Independent Multicast Protocol-Independent Multicast is a family of multicast routing protocols for Internet Protocol networks that provide one-to-many and many-to-many distribution of data over a LAN, WAN or the Internet... |
||
RFC 2373 | |
July 1998 | IPv6 IPv6 Internet Protocol version 6 is a version of the Internet Protocol . It is designed to succeed the Internet Protocol version 4... |
3513 | |
RFC 2397 | The "data" URL scheme | August 1998 | Data: URI scheme Data: URI scheme The data URI scheme is a URI scheme that provides a way to include data in-line in web pages as if they were external resources. It tends to be simpler than other inclusion methods, such as MIME with cid or mid URIs. Data URIs are sometimes called Uniform Resource Locators, although they do not... |
||
RFC 2407 | Internet IP Security Domain of Interpretation for ISAKMP. | November 1998 | IKE Internet key exchange Internet Key Exchange is the protocol used to set up a security association in the IPsec protocol suite. IKE builds upon the Oakley protocol and ISAKMP... |
||
RFC 2408 | Internet Security Association and Key Management Protocol (ISAKMP) | ||||
RFC 2409 | The Internet Key Exchange (IKE) | ||||
RFC 2427 | Multiprotocol Interconnect over Frame Relay | September 1998 | Frame relay Frame relay Frame Relay is a standardized wide area network technology that specifies the physical and logical link layers of digital telecommunications channels using a packet switching methodology... |
1294, 1490 | |
RFC 2440 | OpenPGP Message Format | November 1998 | OpenPGP Pretty Good Privacy Pretty Good Privacy is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions to increase the security... |
||
RFC 2445 | iCalendar Specification | November 1998 | iCalendar ICalendar iCalendar is a computer file format which allows Internet users to send meeting requests and tasks to other Internet users, via email, or sharing files with an extension of .ics... |
||
RFC 2453 | RIP Version 2 | November 1998 | RIP Routing Information Protocol The Routing Information Protocol is a distance-vector routing protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15.... v 2 |
||
RFC 2460 | Internet Protocol, Version 6 (IPv6) Specification | December 1998 | IPv6 IPv6 Internet Protocol version 6 is a version of the Internet Protocol . It is designed to succeed the Internet Protocol version 4... |
||
RFC 2549 | IP over Avian Carriers with Quality of Service | April 1, 1999 | IP over Avian Carriers IP over Avian Carriers In computer networking, IP over Avian Carriers is a humorously intended proposal to carry Internet Protocol traffic by birds such as homing pigeons. IP over Avian Carriers was initially described in RFC 1149, a Request for Comments issued by the Internet Engineering Task Force written by D.... |
||
RFC 2570 | Introduction to Version 3 of the Internet-standard Network Management Framework | April 1999 | SNMP Simple Network Management Protocol Simple Network Management Protocol is an "Internet-standard protocol for managing devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more." It is used mostly in network management systems to monitor... v3 |
||
RFC 2606 | Reserved Top Level DNS Names | June 1999 | Fictitious domain name Fictitious domain name Fictitious Internet resources are websites, Internet Protocol addresses, or other facilities that are purported to be associated with the Internet and are used in works of fiction or popular culture, such as movies and television shows.-IP addresses:... |
example.com, .test, ... | |
RFC 2616 | Hypertext Transfer Protocol -- HTTP/1.1 | June 1999 | HTTP Hypertext Transfer Protocol The Hypertext Transfer Protocol is a networking protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web.... v 1.1 |
||
RFC 2740 | OSPF for IPv6 | December 1999 | OSPF Open Shortest Path First Open Shortest Path First is an adaptive routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system . It is defined as OSPF Version 2 in RFC 2328 for IPv4... |
||
RFC 2743 | Generic Security Service Application Program Interface Version 2, Update 1 | January 2000 | GSSAPI Generic Security Services Application Program Interface The Generic Security Services Application Program Interface is an application programming interface for programs to access security services.... v 2 |
||
RFC 2744 | Generic Security Service API Version 2 : C-bindings | ||||
RFC 2810 | Internet Relay Chat: Architecture | April 2000 | IRC Internet Relay Chat Internet Relay Chat is a protocol for real-time Internet text messaging or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message as well as chat and data transfer, including file... |
||
RFC 2811 | Internet Relay Chat: Channel Management | ||||
RFC 2812 | Internet Relay Chat: Client Protocol | ||||
RFC 2813 | Internet Relay Chat: Server Protocol | ||||
RFC 2821 | Simple Mail Transfer Protocol | April 2001 | SMTP Simple Mail Transfer Protocol Simple Mail Transfer Protocol is an Internet standard for electronic mail transmission across Internet Protocol networks. SMTP was first defined by RFC 821 , and last updated by RFC 5321 which includes the extended SMTP additions, and is the protocol in widespread use today... |
||
RFC 2822 | Internet Message Format | April 2001 | |||
RFC 2853 | Generic Security Service API Version 2 : Java Bindings | June 2000 | GSSAPI Generic Security Services Application Program Interface The Generic Security Services Application Program Interface is an application programming interface for programs to access security services.... v 2 |
||
RFC 2865 | Remote Authentication Dial In User Service (RADIUS) | June 2000 | RADIUS RADIUS Remote Authentication Dial In User Service is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for computers to connect and use a network service... |
||
RFC 2866 | RADIUS Accounting | June 2000 | RADIUS RADIUS Remote Authentication Dial In User Service is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for computers to connect and use a network service... |
||
RFC 2915 | |
September 2000 | DDDS Dynamic Delegation Discovery System Defined in RFC 3401, RFC 3402, RFC 3403, RFC 3404, and RFC 3405.From RFC 3401:The Dynamic Delegation Discovery System is used to implement lazy binding of strings to data, in order to support dynamically configured delegation systems... |
3401 | |
RFC 2960 | |
October 2000 | SCTP Stream Control Transmission Protocol In computer networking, the Stream Control Transmission Protocol is a Transport Layer protocol, serving in a similar role to the popular protocols Transmission Control Protocol and User Datagram Protocol... |
4960 | |
RFC 2965 | HTTP State Management Mechanism | October 2000 | HTTP cookie HTTP cookie A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to send state information to a user's browser and for the browser to return the state information to the origin site... |
||
RFC 2974 | Session Announcement Protocol | October 2000 | SAP Session Announcement Protocol Session Announcement Protocol is a protocol for broadcasting multicast session information.A SAP listening application can listen to the SAP multicast IP address and construct a guide of all advertised multicast sessions... |
||
RFC 3010 | |
December 2000 | NFS v 4 | 3530 | |
RFC 3022 | Traditional IP Network Address Translator (Traditional NAT) | January 2001 | NAT Network address translation In computer networking, network address translation is the process of modifying IP address information in IP packet headers while in transit across a traffic routing device.... |
||
RFC 3031 | Multiprotocol Label Switching Architecture | January 2001 | MPLS Multiprotocol Label Switching Multiprotocol Label Switching is a mechanism in high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table. The labels identify virtual links between... |
||
RFC 3056 | Connection of IPv6 Domains via IPv4 Clouds | February 2001 | 6to4 6to4 6to4 is an Internet transition mechanism for migrating from IPv4 to IPv6, a system that allows IPv6 packets to be transmitted over an IPv4 network without the need to configure explicit tunnels... |
||
RFC 3080 | The Blocks Extensible Exchange Protocol Core | March 2001 | BEEP BEEP In computer networking, BEEP is a framework for creating network application protocols. It includes an application protocol kernel for connection-oriented asynchronous interactions, and can be used both for binary and text messages within the context of a single application user identity.BEEP is... |
||
RFC 3162 | RADIUS and IPv6 | August 2001 | RADIUS RADIUS Remote Authentication Dial In User Service is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for computers to connect and use a network service... (IPv6) |
||
RFC 3174 | |
September 2001 | SHA-1 | 4634 | |
RFC 3261 | SIP: Session Initiation Protocol | June 2002 | SIP Session Initiation Protocol The Session Initiation Protocol is an IETF-defined signaling protocol widely used for controlling communication sessions such as voice and video calls over Internet Protocol . The protocol can be used for creating, modifying and terminating two-party or multiparty sessions... |
||
RFC 3284 | The VCDIFF Generic Differencing and Compression Data Format |
June 2002 | VCDIFF VCDIFF VCDIFF is a format and an algorithm for delta encoding, described in RFC 3284. The algorithm is based on Jon Bentley and Douglas McIlroy's paper "Data Compression Using Long Common Strings" written in 1999. VCDIFF is used as one of the delta encoding algorithm in "Delta encoding in HTTP" .- Delta... |
||
RFC 3286 | An Introduction to the Stream Control Transmission Protocol (SCTP) | May 2002 | SCTP Stream Control Transmission Protocol In computer networking, the Stream Control Transmission Protocol is a Transport Layer protocol, serving in a similar role to the popular protocols Transmission Control Protocol and User Datagram Protocol... |
||
RFC 3315 | Dynamic Host Configuration Protocol for IPv6 (DHCPv6) | July 2003 | DHCP Dynamic Host Configuration Protocol The Dynamic Host Configuration Protocol is a network configuration protocol for hosts on Internet Protocol networks. Computers that are connected to IP networks must be configured before they can communicate with other hosts. The most essential information needed is an IP address, and a default... (IPv6) |
||
RFC 3339 | Date and Time on the Internet: Timestamps | July 2002 | Timestamp Timestamp A timestamp is a sequence of characters, denoting the date or time at which a certain event occurred. A timestamp is the time at which an event is recorded by a computer, not the time of the event itself... |
||
RFC 3376 | Internet Group Management Protocol, Version 3 | October 2002 | IGMP Internet Group Management Protocol The Internet Group Management Protocol is a communications protocol used by hosts and adjacent routers on IP networks to establish multicast group memberships.... v 3 |
||
RFC 3401 | Dynamic Delegation Discovery System (DDDS) Part One: The Comprehensive DDDS | October 2002 | DDDS Dynamic Delegation Discovery System Defined in RFC 3401, RFC 3402, RFC 3403, RFC 3404, and RFC 3405.From RFC 3401:The Dynamic Delegation Discovery System is used to implement lazy binding of strings to data, in order to support dynamically configured delegation systems... |
||
RFC 3402 | Dynamic Delegation Discovery System (DDDS) Part Two: The Algorithm | ||||
RFC 3403 | Dynamic Delegation Discovery System (DDDS) Part Three: The Domain Name System (DNS) Database | ||||
RFC 3404 | Dynamic Delegation Discovery System (DDDS) Part Four: The Uniform Resource Identifiers (URI) Resolution Application | ||||
RFC 3405 | Dynamic Delegation Discovery System (DDDS) Part Five: URI.ARPA Assignment Procedures | ||||
RFC 3501 | INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1 | March 2003 | IMAP Internet Message Access Protocol Internet message access protocol is one of the two most prevalent Internet standard protocols for e-mail retrieval, the other being the Post Office Protocol... v 4r1 |
||
RFC 3513 | |
April 2003 | IPv6 IPv6 Internet Protocol version 6 is a version of the Internet Protocol . It is designed to succeed the Internet Protocol version 4... |
4291 | |
RFC 3530 | Network File System (NFS) version 4 Protocol | April 2003 | NFS v 4 | ||
RFC 3720 | Internet Small Computer Systems Interface (iSCSI) | April 2004 | ISCSI ISCSI In computing, iSCSI , is an abbreviation of Internet Small Computer System Interface, an Internet Protocol -based storage networking standard for linking data storage facilities. By carrying SCSI commands over IP networks, iSCSI is used to facilitate data transfers over intranets and to manage... |
||
RFC 3783 | Small Computer Systems Interface (SCSI) Command Ordering Considerations with iSCSI | May 2004 | ISCSI ISCSI In computing, iSCSI , is an abbreviation of Internet Small Computer System Interface, an Internet Protocol -based storage networking standard for linking data storage facilities. By carrying SCSI commands over IP networks, iSCSI is used to facilitate data transfers over intranets and to manage... |
||
RFC 3801 | Voice Profile for Internet Protocol | June 2004 | VPIM VPIM Voice Profile for Internet Mail is defined in RFC 3801 , an Internet standards track protocol.VPIM defines a subset of the Internet multimedia messaging protocols for use between voice processing server platforms.... |
||
RFC 3977 | Network News Transfer Protocol | October 2006 | NNTP Network News Transfer Protocol The Network News Transfer Protocol is an Internet application protocol used for transporting Usenet news articles between news servers and for reading and posting articles by end user client applications... |
||
RFC 4213 | Basic Transition Mechanisms for IPv6 Hosts and Routers | October 2005 | 6in4 6in4 6in4 is an Internet transition mechanism for migrating from Internet Protocol version 4 to IPv6. 6in4 uses tunneling to encapsulate IPv6 traffic over explicitly-configured IPv4 links as defined in RFC 4213 . The 6in4 traffic is sent over the IPv4 Internet inside IPv4 packets whose IP headers have... |
||
RFC 4217 | Securing FTP with TLS | October 2005 | SSL FTP (FTPS) FTPS FTPS is an extension to the commonly used File Transfer Protocol that adds support for the Transport Layer Security and the Secure Sockets Layer cryptographic protocols.... |
||
RFC 4271 | Border Gateway Protocol 4 | January 2006 | Border Gateway Protocol Border Gateway Protocol The Border Gateway Protocol is the protocol backing the core routing decisions on the Internet. It maintains a table of IP networks or 'prefixes' which designate network reachability among autonomous systems . It is described as a path vector protocol... |
||
RFC 4287 | The Atom Syndication Format | December 2005 | Atom Atom (standard) The name Atom applies to a pair of related standards. The Atom Syndication Format is an XML language used for web feeds, while the Atom Publishing Protocol is a simple HTTP-based protocol for creating and updating web resources.Web feeds allow software programs to check for updates published on a... |
||
RFC 4251 | The Secure Shell (SSH) Protocol Architecture | January 2006 | SSH Secure Shell Secure Shell is a network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that it connects via a secure channel over an insecure network: a server and a client... -2 |
||
RFC 4291 | IP Version 6 Addressing Architecture | February 2006 | IPv6 IPv6 Internet Protocol version 6 is a version of the Internet Protocol . It is designed to succeed the Internet Protocol version 4... |
||
RFC 4353 | A Framework for Conferencing with the Session Initiation Protocol (SIP) | February 2006 | Conference call Conference call A conference call is a telephone call in which the calling party wishes to have more than one called party listen in to the audio portion of the call. The conference calls may be designed to allow the called party to participate during the call, or the call may be set up so that the called party... |
||
RFC 4408 | Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1 | January 2006 | SPF Sender Policy Framework Sender Policy Framework is an email validation system designed to prevent email spam by detecting email spoofing, a common vulnerability, by verifying sender IP addresses. SPF allows administrators to specify which hosts are allowed to send mail from a given domain by creating a specific SPF... |
||
RFC 4422 | Simple Authentication and Security Layer (SASL) | June 2006 | SASL Simple Authentication and Security Layer Simple Authentication and Security Layer is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols, in theory allowing any authentication mechanism supported by SASL to be used in any application protocol that uses... |
||
RFC 4541 | Considerations for Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Snooping Switches | May 2006 | IGMP snooping IGMP snooping IGMP snooping is the process of listening to Internet Group Management Protocol network traffic. IGMP snooping, as implied by the name, is a feature that allows a network switch to listen in on the IGMP conversation between hosts and routers. By listening to these conversations the switch... |
||
RFC 4575 | A Session Initiation Protocol (SIP) Event Package for Conference State | August 2006 | Conference call Conference call A conference call is a telephone call in which the calling party wishes to have more than one called party listen in to the audio portion of the call. The conference calls may be designed to allow the called party to participate during the call, or the call may be set up so that the called party... |
||
RFC 4579 | Session Initiation Protocol (SIP) Call Control - Conferencing for User Agents | August 2006 | Conference call Conference call A conference call is a telephone call in which the calling party wishes to have more than one called party listen in to the audio portion of the call. The conference calls may be designed to allow the called party to participate during the call, or the call may be set up so that the called party... |
||
RFC 4634 | US Secure Hash Algorithms (SHA and HMAC-SHA) | July 2006 | SHA-1, SHA-2 SHA-2 In cryptography, SHA-2 is a set of cryptographic hash functions designed by the National Security Agency and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. SHA-2 includes a significant number of changes from its predecessor,... |
||
RFC 4646 | Tags for Identifying Languages | September 2006 | language tags | ||
RFC 4787 | Network Address Translation (NAT) Behavioral Requirements for Unicast UDP | January 2007 | NAT Network address translation In computer networking, network address translation is the process of modifying IP address information in IP packet headers while in transit across a traffic routing device.... |
||
RFC 4960 | Stream Control Transmission Protocol | September 2007 | SCTP Stream Control Transmission Protocol In computer networking, the Stream Control Transmission Protocol is a Transport Layer protocol, serving in a similar role to the popular protocols Transmission Control Protocol and User Datagram Protocol... |
||
RFC 5023 | The Atom Publishing Protocol | October 2007 | Atom Atom (standard) The name Atom applies to a pair of related standards. The Atom Syndication Format is an XML language used for web feeds, while the Atom Publishing Protocol is a simple HTTP-based protocol for creating and updating web resources.Web feeds allow software programs to check for updates published on a... |
||
RFC 5533 | Shim6: Level 3 Multihoming Shim Protocol for IPv6 | June 2009 | Site Multihoming by IPv6 Intermediation Site Multihoming by IPv6 Intermediation -Architecture:The SHIM6 architecture defines SHIM6 Failure Detection and Locator Pair Exploration functions. The first is used to detect outages through the path defined by the current locator pair for a communication. To achieve this, hints provided by upper protocols such as TCP are used, or... |
||
RFC 5969 | IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) | January 2010 | IPv6 rapid deployment IPv6 rapid deployment 6rd is a mechanism to facilitate IPv6 rapid deployment across IPv4 infrastructures of Internet service providers .It is derived from 6to4, a preexisting mechanism to transfer IPv6 packets over the IPv4 network, with the significant change that it operates entirely within the end-user's ISP's... |
Topical list
Obsolete RFCs are indicated withTopic | Related RFCs |
---|---|
Address Resolution Protocol Address Resolution Protocol Address Resolution Protocol is a telecommunications protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks. ARP was defined by RFC 826 in 1982. It is Internet Standard STD 37... |
826 |
BEEP BEEP In computer networking, BEEP is a framework for creating network application protocols. It includes an application protocol kernel for connection-oriented asynchronous interactions, and can be used both for binary and text messages within the context of a single application user identity.BEEP is... |
3080 |
BOOTP BOOTP In computer networking, the Bootstrap Protocol, or BOOTP, is a network protocol used by a network client to obtain an IP address from a configuration server. The BOOTP protocol was originally defined in RFC 951.... |
951 |
CRAM-MD5 CRAM-MD5 In cryptography, CRAM-MD5 is achallenge-response authentication mechanism defined in RFC 2195 based on theHMAC-MD5 MACalgorithm... |
2195 |
Date and Time on the Internet (ISO 8601 ISO 8601 ISO 8601 Data elements and interchange formats – Information interchange – Representation of dates and times is an international standard covering the exchange of date and time-related data. It was issued by the International Organization for Standardization and was first published in 1988... ) |
3339 |
DEFLATE DEFLATE Deflate is a lossless data compression algorithm that uses a combination of the LZ77 algorithm and Huffman coding. It was originally defined by Phil Katz for version 2 of his PKZIP archiving tool and was later specified in RFC 1951.... |
1951 |
DISCARD DISCARD The Discard Protocol is a service in the Internet Protocol Suite defined in RFC 863. It is intended for testing, debugging, and measurement purposes.... |
863 |
Domain Name System Domain name system The Domain Name System is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities... |
1034, 1035, 2606 |
Dynamic Delegation Discovery System Dynamic Delegation Discovery System Defined in RFC 3401, RFC 3402, RFC 3403, RFC 3404, and RFC 3405.From RFC 3401:The Dynamic Delegation Discovery System is used to implement lazy binding of strings to data, in order to support dynamically configured delegation systems... |
|
Dynamic Host Configuration Protocol Dynamic Host Configuration Protocol The Dynamic Host Configuration Protocol is a network configuration protocol for hosts on Internet Protocol networks. Computers that are connected to IP networks must be configured before they can communicate with other hosts. The most essential information needed is an IP address, and a default... |
|
Extensible Messaging and Presence Protocol Extensible Messaging and Presence Protocol Extensible Messaging and Presence Protocol is an open-standard communications protocol for message-oriented middleware based on XML . The protocol was originally named Jabber, and was developed by the Jabber open-source community in 1999 for near-real-time, extensible instant messaging , presence... |
3920 3921 3922 |
ECHO protocol ECHO protocol The Echo Protocol is a service in the Internet Protocol Suite defined in RFC 862. It was originally proposed for testing and measurement of round-trip times in IP networks.... |
862 |
Fictitious domain name Fictitious domain name Fictitious Internet resources are websites, Internet Protocol addresses, or other facilities that are purported to be associated with the Internet and are used in works of fiction or popular culture, such as movies and television shows.-IP addresses:... |
2606 |
File Transfer Protocol File Transfer Protocol File Transfer Protocol is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server... |
114, |
Frame Relay Frame relay Frame Relay is a standardized wide area network technology that specifies the physical and logical link layers of digital telecommunications channels using a packet switching methodology... |
|
Generic Security Services Application Program Interface Generic Security Services Application Program Interface The Generic Security Services Application Program Interface is an application programming interface for programs to access security services.... |
|
gzip Gzip Gzip is any of several software applications used for file compression and decompression. The term usually refers to the GNU Project's implementation, "gzip" standing for GNU zip. It is based on the DEFLATE algorithm, which is a combination of Lempel-Ziv and Huffman coding... |
1952 |
HyperText Transfer Protocol Hypertext Transfer Protocol The Hypertext Transfer Protocol is a networking protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web.... |
1945 (v 1.0), 2616 (v 1.1) |
Internet Control Message Protocol Internet Control Message Protocol The Internet Control Message Protocol is one of the core protocols of the Internet Protocol Suite. It is chiefly used by the operating systems of networked computers to send error messages indicating, for example, that a requested service is not available or that a host or router could not be... |
792 |
Internet Group Management Protocol Internet Group Management Protocol The Internet Group Management Protocol is a communications protocol used by hosts and adjacent routers on IP networks to establish multicast group memberships.... |
|
Internet Key Exchange Internet key exchange Internet Key Exchange is the protocol used to set up a security association in the IPsec protocol suite. IKE builds upon the Oakley protocol and ISAKMP... |
IKE RFC 2409, RFC 2407(ISAKMP), RFC 2408 (ISAKMP) , IKEv2 RFC 4306 , IKEv2 RFC 4301 , RFC 4310 (DNS) |
Internet Message Access Protocol Internet Message Access Protocol Internet message access protocol is one of the two most prevalent Internet standard protocols for e-mail retrieval, the other being the Post Office Protocol... |
1176 (v 2), 1730 (v 4), |
Internet Protocol Internet Protocol The Internet Protocol is the principal communications protocol used for relaying datagrams across an internetwork using the Internet Protocol Suite... |
see IPv4 and IPv6 |
IP over Avian Carriers IP over Avian Carriers In computer networking, IP over Avian Carriers is a humorously intended proposal to carry Internet Protocol traffic by birds such as homing pigeons. IP over Avian Carriers was initially described in RFC 1149, a Request for Comments issued by the Internet Engineering Task Force written by D.... |
1149, 2549 |
IPv4 IPv4 Internet Protocol version 4 is the fourth revision in the development of the Internet Protocol and the first version of the protocol to be widely deployed. Together with IPv6, it is at the core of standards-based internetworking methods of the Internet... |
|
IPv6 IPv6 Internet Protocol version 6 is a version of the Internet Protocol . It is designed to succeed the Internet Protocol version 4... |
|
IPv6 IPv6 Internet Protocol version 6 is a version of the Internet Protocol . It is designed to succeed the Internet Protocol version 4... addressing |
|
Internet Relay Chat Internet Relay Chat Internet Relay Chat is a protocol for real-time Internet text messaging or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message as well as chat and data transfer, including file... |
1459, 2810, 2811, 2812, 2813 |
ISCSI ISCSI In computing, iSCSI , is an abbreviation of Internet Small Computer System Interface, an Internet Protocol -based storage networking standard for linking data storage facilities. By carrying SCSI commands over IP networks, iSCSI is used to facilitate data transfers over intranets and to manage... |
3720, 3783 |
Kerberos | 1964 |
Lightweight Directory Access Protocol Lightweight Directory Access Protocol The Lightweight Directory Access Protocol is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network... |
|
Microsoft Point-to-Point Encryption | |
MD5 MD5 The MD5 Message-Digest Algorithm is a widely used cryptographic hash function that produces a 128-bit hash value. Specified in RFC 1321, MD5 has been employed in a wide variety of security applications, and is also commonly used to check data integrity... |
1321 |
Multiprotocol Label Switching Multiprotocol Label Switching Multiprotocol Label Switching is a mechanism in high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table. The labels identify virtual links between... |
3031 |
Multipurpose Internet Mail Extensions | 2045 2046 2047 2049 |
Network address translation Network address translation In computer networking, network address translation is the process of modifying IP address information in IP packet headers while in transit across a traffic routing device.... |
|
Network File System | |
Network News Transfer Protocol Network News Transfer Protocol The Network News Transfer Protocol is an Internet application protocol used for transporting Usenet news articles between news servers and for reading and posting articles by end user client applications... |
|
Network Time Protocol Network Time Protocol The Network Time Protocol is a protocol and software implementation for synchronizing the clocks of computer systems over packet-switched, variable-latency data networks. Originally designed by David L... |
1059 (v.1), 1119 (v.2), 1305 (v.3) |
Open Shortest Path First Open Shortest Path First Open Shortest Path First is an adaptive routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system . It is defined as OSPF Version 2 in RFC 2328 for IPv4... |
|
Pretty Good Privacy Pretty Good Privacy Pretty Good Privacy is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions to increase the security... |
1991, 2440 |
Protocol Independent Multicast Protocol Independent Multicast Protocol-Independent Multicast is a family of multicast routing protocols for Internet Protocol networks that provide one-to-many and many-to-many distribution of data over a LAN, WAN or the Internet... |
|
Reverse Address Resolution Protocol Reverse Address Resolution Protocol The Reverse Address Resolution Protocol is an obsolete computer networking protocol used by a host computer to request its Internet Protocol address from an administrative host, when it has available its Link Layer or hardware address, such as a MAC address.RARP is described in Internet... |
903 |
Post Office Protocol Post Office Protocol In computing, the Post Office Protocol is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP and IMAP are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern... |
|
RADIUS RADIUS Remote Authentication Dial In User Service is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for computers to connect and use a network service... |
|
Real-time Transport Protocol Real-time Transport Protocol The Real-time Transport Protocol defines a standardized packet format for delivering audio and video over IP networks. RTP is used extensively in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications, television services and... |
1889 |
Real Time Streaming Protocol Real Time Streaming Protocol The Real Time Streaming Protocol is a network control protocol designed for use in entertainment and communications systems to control streaming media servers. The protocol is used for establishing and controlling media sessions between end points... |
2326 |
Routing Information Protocol Routing Information Protocol The Routing Information Protocol is a distance-vector routing protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15.... |
1058 (v.1), |
Sender Policy Framework Sender Policy Framework Sender Policy Framework is an email validation system designed to prevent email spam by detecting email spoofing, a common vulnerability, by verifying sender IP addresses. SPF allows administrators to specify which hosts are allowed to send mail from a given domain by creating a specific SPF... |
4408 |
Secure Shell Secure Shell Secure Shell is a network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that it connects via a secure channel over an insecure network: a server and a client... -2 |
4251 |
Session Announcement Protocol Session Announcement Protocol Session Announcement Protocol is a protocol for broadcasting multicast session information.A SAP listening application can listen to the SAP multicast IP address and construct a guide of all advertised multicast sessions... |
2974 |
Session Description Protocol Session Description Protocol The Session Description Protocol is a format for describing streaming media initialization parameters. The IETF published the original specification as an IETF Proposed Standard in April 1998, and subsequently published a revised specification as an IETF Proposed Standard as RFC 4566 in July... |
2327 |
Session Initiation Protocol Session Initiation Protocol The Session Initiation Protocol is an IETF-defined signaling protocol widely used for controlling communication sessions such as voice and video calls over Internet Protocol . The protocol can be used for creating, modifying and terminating two-party or multiparty sessions... |
3261 |
SHA hash functions SHA hash functions In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and... |
|
Simple Authentication and Security Layer Simple Authentication and Security Layer Simple Authentication and Security Layer is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols, in theory allowing any authentication mechanism supported by SASL to be used in any application protocol that uses... |
|
Simple Mail Transfer Protocol Simple Mail Transfer Protocol Simple Mail Transfer Protocol is an Internet standard for electronic mail transmission across Internet Protocol networks. SMTP was first defined by RFC 821 , and last updated by RFC 5321 which includes the extended SMTP additions, and is the protocol in widespread use today... |
|
Simple Network Management Protocol Simple Network Management Protocol Simple Network Management Protocol is an "Internet-standard protocol for managing devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more." It is used mostly in network management systems to monitor... |
|
Stream Control Transmission Protocol Stream Control Transmission Protocol In computer networking, the Stream Control Transmission Protocol is a Transport Layer protocol, serving in a similar role to the popular protocols Transmission Control Protocol and User Datagram Protocol... |
|
TELNET TELNET Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection... |
854, 855 |
Transmission Control Protocol Transmission Control Protocol The Transmission Control Protocol is one of the core protocols of the Internet Protocol Suite. TCP is one of the two original components of the suite, complementing the Internet Protocol , and therefore the entire suite is commonly referred to as TCP/IP... |
793 |
Transport Layer Security Transport Layer Security Transport Layer Security and its predecessor, Secure Sockets Layer , are cryptographic protocols that provide communication security over the Internet... 1.0 |
2246 |
Trivial File Transfer Protocol Trivial File Transfer Protocol Trivial File Transfer Protocol is a file transfer protocol known for its simplicity. It is generally used forautomated transfer of configuration or boot files between machines in a local environment.... |
|
Usenet Usenet Usenet is a worldwide distributed Internet discussion system. It developed from the general purpose UUCP architecture of the same name.Duke University graduate students Tom Truscott and Jim Ellis conceived the idea in 1979 and it was established in 1980... |
|
Uniform Resource Identifier Uniform Resource Identifier In computing, a uniform resource identifier is a string of characters used to identify a name or a resource on the Internet. Such identification enables interaction with representations of the resource over a network using specific protocols... |
3986 |
User Datagram Protocol User Datagram Protocol The User Datagram Protocol is one of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol network without requiring... |
768 |
UTF-8 UTF-8 UTF-8 is a multibyte character encoding for Unicode. Like UTF-16 and UTF-32, UTF-8 can represent every character in the Unicode character set. Unlike them, it is backward-compatible with ASCII and avoids the complications of endianness and byte order marks... |
3629 |
zlib Zlib zlib is a software library used for data compression. zlib was written by Jean-Loup Gailly and Mark Adler and is an abstraction of the DEFLATE compression algorithm used in their gzip file compression program. Zlib is also a crucial component of many software platforms including Linux, Mac OS X,... |
1950 |
External links
- RFC Database - contains various lists of RFCs
- [ftp://ftp.rfc-editor.org/in-notes/rfc-ref.txt RFC Bibliographic Listing] - Listing of bibliographic entries for all RFCs. Also notes when an RFC has been obsoleted.
- RFC Search - search by keywords; cross-referenced RFCs
- RFC Authors - list of top RFC authors