List of network protocols
Encyclopedia
This is a list of network protocols, categorized by their nearest Open Systems Interconnection
(OSI) model layers. Many of these protocols, however, are originally based on the Internet Protocol Suite
(TCP/IP) and other models and they often do not fit neatly into OSI layers.
Layer 2 protocols (Data Link Layer)
Layer 3 protocols (Network Layer)
Layer 4 protocols (Transport Layer)
Layer 5 protocols (Session Layer)
Layer 7 protocols (Application Layer)
Open Systems Interconnection
Open Systems Interconnection is an effort to standardize networking that was started in 1977 by the International Organization for Standardization , along with the ITU-T.-History:...
(OSI) model layers. Many of these protocols, however, are originally based on the Internet Protocol Suite
Internet protocol suite
The Internet protocol suite is the set of communications protocols used for the Internet and other similar networks. It is commonly known as TCP/IP from its most important protocols: Transmission Control Protocol and Internet Protocol , which were the first networking protocols defined in this...
(TCP/IP) and other models and they often do not fit neatly into OSI layers.
Layer 1+2 protocols (Physical)
- EthernetEthernetEthernet is a family of computer networking technologies for local area networks commercially introduced in 1980. Standardized in IEEE 802.3, Ethernet has largely replaced competing wired LAN technologies....
- GFPGeneric Framing ProcedureGeneric Framing Procedure is a multiplexing technique defined by ITU-T G.7041. This allows mapping of variable length, higher-layer client signals over a circuit switched transport network like OTN, SDH/SONET or PDH...
ITU-T G.7041 Generic Framing Procedure - OTNOptical Transport NetworkITU-T defines an Optical Transport Network as a set of Optical Network Elements connected by optical fibre links, able to provide functionality of transport, multiplexing, switching, management, supervision and survivability of optical channels carrying client signals...
ITU-T G.709 Optical Transport Network also called Optical Channel Wrapper or Digital Wrapper Technology
Layer 2 protocols (Data Link Layer)Data link layerThe data link layer is layer 2 of the seven-layer OSI model of computer networking. It corresponds to, or is part of the link layer of the TCP/IP reference model....
- ARCnetARCNETARCNET is a local area network protocol, similar in purpose to Ethernet or Token Ring. ARCNET was the first widely available networking system for microcomputers and became popular in the 1980s for office automation tasks...
Attached Resource Computer NETwork - ARPAddress Resolution ProtocolAddress Resolution Protocol is a telecommunications protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks. ARP was defined by RFC 826 in 1982. It is Internet Standard STD 37...
Address Resolution Protocol - RARP Reverse Address Resolution Protocol
- CDPCisco Discovery ProtocolThe Cisco Discovery Protocol is a proprietary Data Link Layer network protocol developed by Cisco Systems. It is used to share information about other directly connected Cisco equipment, such as the operating system version and IP address...
Cisco Discovery Protocol - DCAP Data Link Switching Client Access Protocol
- Distributed Multi-Link TrunkingDistributed Multi-Link TrunkingDistributed Multi-Link Trunking or Distributed MLT is a computer networking protocol designed by Avaya used to load balance the network traffic across connections and also across multiple switches or modules in a chassis...
- Distributed Split Multi-Link TrunkingDistributed Split Multi-Link TrunkingDistributed Split Multi-Link Trunking or Distributed SMLT is a computer networking technology designed by Avaya to enhance the Split Multi-Link Trunking protocol...
- Dynamic Trunking ProtocolDynamic Trunking ProtocolThe Dynamic Trunking Protocol is a proprietary networking protocol developed by Cisco Systems for the purpose of negotiating trunking on a link between two VLAN-aware switches, and for negotiating the type of trunking encapsulation to be used. It works on the Layer 2 of the OSI model...
- EconetEconetEconet was Acorn's low-cost local area network system, intended for use by schools and small businesses. Econet is rumoured to be an abbreviation of Economy Network, but Acorn were always careful to stress the Greek root, oikos, meaning "house"....
- FDDIFiber distributed data interfaceFiber Distributed Data Interface provides a 100 Mbit/s optical standard for data transmission in a local area network that can extend in range up to . Although FDDI logical topology is a ring-based token network, it does not use the IEEE 802.5 token ring protocol as its basis; instead, its...
Fiber Distributed Data Interface - Frame RelayFrame relayFrame Relay is a standardized wide area network technology that specifies the physical and logical link layers of digital telecommunications channels using a packet switching methodology...
- ITU-TITU-TThe ITU Telecommunication Standardization Sector is one of the three sectors of the International Telecommunication Union ; it coordinates standards for telecommunications....
G.hnG.hnG.hn is the common name for a home network technology family of standards developed under the International Telecommunication Union's Standardization arm and promoted by the HomeGrid Forum...
Data Link LayerData link layerThe data link layer is layer 2 of the seven-layer OSI model of computer networking. It corresponds to, or is part of the link layer of the TCP/IP reference model.... - HDLCHigh-Level Data Link ControlHigh-Level Data Link Control is a bit-oriented synchronous data link layer protocol developed by the International Organization for Standardization...
High-Level Data Link Control - IEEE 802.11IEEE 802.11IEEE 802.11 is a set of standards for implementing wireless local area network computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee . The base version of the standard IEEE 802.11-2007 has had subsequent...
WiFi - IEEE 802.16IEEE 802.16IEEE 802.16 is a series of Wireless Broadband standards authored by the Institute of Electrical and Electronics Engineers . The IEEE Standards Board in established a working group in 1999 to develop standards for broadband Wireless Metropolitan Area Networks...
WiMAX - LattisNetLattisNetLattisNet was a family of computer networking hardware and software products built and sold by SynOptics Communications during the 1980s...
- LocalTalkLocalTalkLocalTalk is a particular implementation of the physical layer of the AppleTalk networking system from Apple Computer. LocalTalk specifies a system of shielded twisted pair cabling, plugged into self-terminating transceivers, running at a rate of 230.4 kbit/s...
- L2F Layer 2 Forwarding Protocol
- L2TPL2TPIn computer networking, Layer 2 Tunneling Protocol is a tunneling protocol used to support virtual private networks . It does not provide any encryption or confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide privacy.-History:Published in 1999...
Layer 2 Tunneling Protocol - LAPDLink Access Procedures, D channelLink Access Procedures on the D channel , specified in ITU-T Q.920 and ITU-T Q.921, is the second layer protocol on the ISDN protocol stack in the D channel.It is heavily based on HDLC.-External links:*http://www.protocols.com/pbook/pdf/isdn.pdf...
Link Access Procedures on the D channel - LLDPLink Layer Discovery ProtocolThe Link Layer Discovery Protocol is a vendor-neutral Link Layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on a IEEE 802 local area network, principally wired Ethernet...
Link Layer Discovery Protocol - LLDP-MED Link Layer Discovery Protocol - Media Endpoint Discovery
- PPPPoint-to-Point ProtocolIn networking, the Point-to-Point Protocol is a data link protocol commonly used in establishing a direct connection between two networking nodes...
Point-to-Point Protocol - PPTPPoint-to-point tunneling protocolThe Point-to-Point Tunneling Protocol is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets....
Point-to-Point Tunneling Protocol - Q.710Message Transfer PartThe Message Transfer Part is part of the Signaling System 7 used for communication in Public Switched Telephone Networks. MTP is responsible for reliable, unduplicated and in-sequence transport of SS7 messages between communication partners....
Simplified Message Transfer PartMessage Transfer PartThe Message Transfer Part is part of the Signaling System 7 used for communication in Public Switched Telephone Networks. MTP is responsible for reliable, unduplicated and in-sequence transport of SS7 messages between communication partners.... - Multi-link trunkingMulti-link trunkingMulti-Link Trunking is a link aggregation or IEEE 802.3ad port trunking technology designed by Nortel . It allows grouping several physical Ethernet links into one logical Ethernet link to provide fault-tolerance and high-speed links between routers, switches, and servers...
Protocol - RPRResilient Packet RingResilient Packet Ring , also known as IEEE 802.17, is a standard designed for the optimized transport of data traffic over optical fiber ring networks...
IEEE 802.17 Resilient Packet Ring - SLIPSerial Line Internet ProtocolThe Serial Line Internet Protocol is an encapsulation of the Internet Protocol designed to work over serial ports and modem connections. It is documented in RFC 1055...
Serial Line Internet Protocol (obsolete) - StarLANStarLANStarLAN was the first implementation of 1 megabit per second Ethernet over twisted pair wiring. It was standardized by the standards association of the Institute of Electrical and Electronics Engineers as 802.3e in 1986, as the 1BASE5 version of Ethernet.-Description:StarLAN was developed by AT&T...
- STPSpanning tree protocolThe Spanning Tree Protocol is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network. The basic function of STP is to prevent bridge loops and ensuing broadcast radiation...
Spanning Tree Protocol - Split multi-link trunking Protocol
- Token ring is not a protocol but is a topology
- VTPVTPVLAN Trunking Protocol is a Cisco proprietary protocol that propagates the definition of Virtual Local Area Networks on the whole local area network. To do this, VTP carries VLAN information to all the switches in a VTP domain. VTP advertisements can be sent over ISL, 802.1q, IEEE 802.10 and...
VLAN Trunking Protocoloney
Layer 2+3 protocols
- ATMAsynchronous Transfer ModeAsynchronous Transfer Mode is a standard switching technique designed to unify telecommunication and computer networks. It uses asynchronous time-division multiplexing, and it encodes data into small, fixed-sized cells. This differs from approaches such as the Internet Protocol or Ethernet that...
Asynchronous Transfer Mode - Frame relayFrame relayFrame Relay is a standardized wide area network technology that specifies the physical and logical link layers of digital telecommunications channels using a packet switching methodology...
, a simplified version of X.25 welcome - MPLS Multi-protocol label switching
- SPB Shortest Path Bridging
- X.25X.25X.25 is an ITU-T standard protocol suite for packet switched wide area network communication. An X.25 WAN consists of packet-switching exchange nodes as the networking hardware, and leased lines, Plain old telephone service connections or ISDN connections as physical links...
Layer 1+2+3 protocols
- MTPMessage Transfer PartThe Message Transfer Part is part of the Signaling System 7 used for communication in Public Switched Telephone Networks. MTP is responsible for reliable, unduplicated and in-sequence transport of SS7 messages between communication partners....
Message Transfer Part - NSP Network Service Part
Layer 3 protocols (Network Layer)Network layerThe network layer is layer 3 of the seven-layer OSI model of computer networking.The network layer is responsible for packet forwarding including routing through intermediate routers, whereas the data link layer is responsible for media access control, flow control and error checking.The network...
- CLNP Connectionless Networking Protocol
- EGPExterior Gateway ProtocolThe Exterior Gateway Protocol is a now obsolete routing protocol for the Internet originally specified in 1982 by Eric C. Rosen of Bolt, Beranek and Newman, and David L. Mills. It was first described in RFC 827 and formally specified in RFC 904...
Exterior Gateway Protocol - EIGRP Enhanced Interior Gateway Routing Protocol
- ICMPInternet Control Message ProtocolThe Internet Control Message Protocol is one of the core protocols of the Internet Protocol Suite. It is chiefly used by the operating systems of networked computers to send error messages indicating, for example, that a requested service is not available or that a host or router could not be...
Internet Control Message Protocol - IGMP Internet Group Management Protocol
- IGRP Interior Gateway Routing Protocol
- IPv4IPv4Internet Protocol version 4 is the fourth revision in the development of the Internet Protocol and the first version of the protocol to be widely deployed. Together with IPv6, it is at the core of standards-based internetworking methods of the Internet...
Internet Protocol version 4 - IPv6IPv6Internet Protocol version 6 is a version of the Internet Protocol . It is designed to succeed the Internet Protocol version 4...
Internet Protocol version 6 - IPSecIPsecInternet Protocol Security is a protocol suite for securing Internet Protocol communications by authenticating and encrypting each IP packet of a communication session...
Internet Protocol Security - IPXIPXInternetwork Packet Exchange is the OSI-model Network layer protocol in the IPX/SPX protocol stack.The IPX/SPXM protocol stack is supported by Novell's NetWare network operating system. Because of Netware's popularity through the late 1980s into the mid 1990s, IPX became a popular internetworking...
Internetwork Packet Exchange - Routed-SMLTR-SMLTRouted-SMLT is a computer networking protocol designed by Nortel as an enhancement to SMLT enabling the exchange of Layer 3 information between peer nodes in a Switch Cluster for unparalleled resiliency and simplicity for both L3 and L2.In many cases, core network convergence-times after a...
- SCCP Signalling Connection Control Part
- AppleTalk DDP
Layer 3 protocols (Network Layer management)
- IS-ISIS-ISIntermediate System To Intermediate System , is a routing protocol designed to move information efficiently within a computer network, a group of physically connected computers or similar devices....
Intermediate System-to-Intermediate System - OSPFOpen Shortest Path FirstOpen Shortest Path First is an adaptive routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system . It is defined as OSPF Version 2 in RFC 2328 for IPv4...
Open Shortest Path First - BGPBorder Gateway ProtocolThe Border Gateway Protocol is the protocol backing the core routing decisions on the Internet. It maintains a table of IP networks or 'prefixes' which designate network reachability among autonomous systems . It is described as a path vector protocol...
Border Gateway Protocol - RIPRouting Information ProtocolThe Routing Information Protocol is a distance-vector routing protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15....
Routing Information Protocol - ICMP Router Discovery ProtocolICMP Router Discovery ProtocolICMP Internet Router Discovery Protocol uses Internet Control Message Protocol router advertisements and router solicitation messages to allow a host to discover the addresses of operational routers on the subnet....
: Implementation of RFC 1256 - NDPNeighbor Discovery ProtocolThe Neighbor Discovery Protocol is a protocol in the Internet Protocol Suite used with Internet Protocol Version 6 . It operates in the Link Layer of the Internet model and is responsible for address autoconfiguration of nodes, discovery of other nodes on the link, determining the Link Layer...
Neighbor Discovery Protocol - Gateway Discovery Protocol (GDP) is a Cisco protocol similar to IRDPICMP Router Discovery ProtocolICMP Internet Router Discovery Protocol uses Internet Control Message Protocol router advertisements and router solicitation messages to allow a host to discover the addresses of operational routers on the subnet....
- IGRP
- EIGRP
Layer 3+4 protocol suites
- AppleTalkAppleTalkAppleTalk is a proprietary suite of protocols developed by Apple Inc. for networking computers. It was included in the original Macintosh released in 1984, but is now unsupported as of the release of Mac OS X v10.6 in 2009 in favor of TCP/IP networking...
- DECnetDECnetDECnet is a suite of network protocols created by Digital Equipment Corporation, originally released in 1975 in order to connect two PDP-11 minicomputers. It evolved into one of the first peer-to-peer network architectures, thus transforming DEC into a networking powerhouse in the 1980s...
- IPX/SPXIPX/SPXIPX/SPX stands for Internetwork Packet Exchange/Sequenced Packet Exchange. IPX and SPX are networking protocols used primarily on networks using the Novell NetWare operating systems.-Protocol Layers:...
- Internet Protocol SuiteInternet protocol suiteThe Internet protocol suite is the set of communications protocols used for the Internet and other similar networks. It is commonly known as TCP/IP from its most important protocols: Transmission Control Protocol and Internet Protocol , which were the first networking protocols defined in this...
- Xerox Network Systems
Layer 4 protocols (Transport Layer)Transport layerIn computer networking, the transport layer or layer 4 provides end-to-end communication services for applications within a layered architecture of network components and protocols...
- AH Authentication Header over IP or IPSec
- ESP Encapsulating Security Payload over IP or IPSec
- GREGeneric Routing EncapsulationGeneric Routing Encapsulation is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol internetwork.-Overview:...
Generic Routing Encapsulation for tunneling - ILIL ProtocolThe Internet Link protocol or IL is a connection-based transport layer protocol designed at Bell Labs originally as part of the Plan 9 operating system and is used to carry 9P. It is assigned the Internet Protocol number of 40...
Originally developed as transport layer for 9P9P9P is a network protocol developed for the Plan 9 from Bell Labs distributed operating system as the means of connecting the components of a Plan 9 system. Files are key objects in Plan 9. They represent windows, network connections, processes, and almost anything else available in the operating... - SCTPStream Control Transmission ProtocolIn computer networking, the Stream Control Transmission Protocol is a Transport Layer protocol, serving in a similar role to the popular protocols Transmission Control Protocol and User Datagram Protocol...
Stream Control Transmission Protocol - Sinec H1Sinec H1Sinec H1 is an Ethernet-based protocol that provides the transport layer function. The protocol was developed by Siemens and is used mainly for control applications. It has large bandwidth and is well suited to the transmission of large volumes of data....
for telecontrol - SPXIPX/SPXIPX/SPX stands for Internetwork Packet Exchange/Sequenced Packet Exchange. IPX and SPX are networking protocols used primarily on networks using the Novell NetWare operating systems.-Protocol Layers:...
Sequenced Packet Exchange - TCPTransmission Control ProtocolThe Transmission Control Protocol is one of the core protocols of the Internet Protocol Suite. TCP is one of the two original components of the suite, complementing the Internet Protocol , and therefore the entire suite is commonly referred to as TCP/IP...
Transmission Control Protocol - UDPUser Datagram ProtocolThe User Datagram Protocol is one of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol network without requiring...
User Datagram Protocol - DCCPDatagram Congestion Control ProtocolThe Datagram Congestion Control Protocol is a message-oriented Transport Layer protocol. DCCP implements reliable connection setup, teardown, Explicit Congestion Notification , congestion control, and feature negotiation. DCCP was published as RFC 4340, a proposed standard, by the IETF in March,...
Datagram Congestion Control Protocol
Layer 5 protocols (Session Layer)Session layerThe session layer is layer 5 of the seven-layer OSI model of computer networking.The session layer provides the mechanism for opening, closing and managing a session between end-user application processes, i.e., a semi-permanent dialogue. Communication sessions consist of requests and responses...
- 9P9P9P is a network protocol developed for the Plan 9 from Bell Labs distributed operating system as the means of connecting the components of a Plan 9 system. Files are key objects in Plan 9. They represent windows, network connections, processes, and almost anything else available in the operating...
Distributed file system protocol developed originally as part of Plan 9Plan 9 from Bell LabsPlan 9 from Bell Labs is a distributed operating system. It was developed primarily for research purposes as the successor to Unix by the Computing Sciences Research Center at Bell Labs between the mid-1980s and 2002... - NCPNetWare Core ProtocolThe NetWare Core Protocol is a network protocol used in some products from Novell, Inc. It is usually associated with the NetWare operating system, but parts of it have been implemented on other platforms such as Linux, Windows NT and various flavors of Unix.It is used to access file, print,...
NetWare Core Protocol - NFS Network File System
- SMBServer Message BlockIn computer networking, Server Message Block , also known as Common Internet File System operates as an application-layer network protocol mainly used to provide shared access to files, printers, serial ports, and miscellaneous communications between nodes on a network. It also provides an...
Server Message Block - SOCKSSOCKSSOCKS is an Internet protocol that routes network packets between a client and server through a proxy server. SOCKS5 additionally provides authentication so only authorized users may access a server...
"SOCKetS"
Layer 7 protocols (Application Layer)Application layerThe Internet protocol suite and the Open Systems Interconnection model of computer networking each specify a group of protocols and methods identified by the name application layer....
- ADCAdvanced Direct ConnectAdvanced Direct Connect is a peer-to-peer file sharing and chat protocol, using the same topology, concepts and terminology as the Direct Connect protocol....
, A peer-to-peer file sharing protocol - AFPApple Filing ProtocolThe Apple Filing Protocol is a network protocol that offers file services for Mac OS X and original Mac OS. In Mac OS X, AFP is one of several file services supported including Server Message Block , Network File System , File Transfer Protocol , and WebDAV...
, Apple Filing Protocol - BACnetBACnetBACnet is a communications protocol for building automation and control networks. It is an ASHRAE, ANSI, and ISO standard protocol....
, Building Automation and Control Network protocol - BitTorrent, A peer-to-peer file sharing protocol
- BOOTPBOOTPIn computer networking, the Bootstrap Protocol, or BOOTP, is a network protocol used by a network client to obtain an IP address from a configuration server. The BOOTP protocol was originally defined in RFC 951....
, Bootstrap Protocol - CAMEL, an SS7 protocol tool for the home operator
- Diameter, an authentication, authorization and accounting protocol
- DICOM includes a network protocol definition
- DICTDICTDICT is a dictionary network protocol created by the DICT Development Group. It is described by RFC 2229. Its goal is to surpass the Webster protocol and to allow clients to access more dictionaries during use...
, Dictionary protocol - DNSDomain name systemThe Domain Name System is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities...
, Domain Name System - DSM-CC Digital Storage Media Command and Control
- DHCPDynamic Host Configuration ProtocolThe Dynamic Host Configuration Protocol is a network configuration protocol for hosts on Internet Protocol networks. Computers that are connected to IP networks must be configured before they can communicate with other hosts. The most essential information needed is an IP address, and a default...
, Dynamic Host Configuration Protocol - ED2KEDonkey networkThe eDonkey network is a decentralized, mostly server-based, peer-to-peer file sharing network best suited to share big files among users, and to provide long term availability of files...
, A peer-to-peer file sharing protocol - FTPFile Transfer ProtocolFile Transfer Protocol is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server...
, File Transfer Protocol - FingerFinger protocolIn computer networking, the Name/Finger protocol and the Finger user information protocol are simple network protocols for the exchange of human-oriented status and user information.-Name/Finger protocol:...
, which gives user profile information - GnutellaGnutellaGnutella is a large peer-to-peer network which, at the time of its creation, was the first decentralized peer-to-peer network of its kind, leading to other, later networks adopting the model...
, a peer-to-peer file-swapping protocol - Gopher, a hierarchical hyperlinkable protocol
- HTTP, Hypertext Transfer Protocol
- HTTPSHttpsHypertext Transfer Protocol Secure is a combination of the Hypertext Transfer Protocol with SSL/TLS protocol to provide encrypted communication and secure identification of a network web server...
, Hypertext Transfer Protocol Secure - IMAPInternet Message Access ProtocolInternet message access protocol is one of the two most prevalent Internet standard protocols for e-mail retrieval, the other being the Post Office Protocol...
, Internet Message Access Protocol - IRCInternet Relay ChatInternet Relay Chat is a protocol for real-time Internet text messaging or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message as well as chat and data transfer, including file...
, Internet Relay Chat - ISUPISDN User PartThe ISDN User Part or ISUP is part of the Signaling System #7 which is used to set up telephone calls in Public Switched Telephone Networks...
, ISDN User Part - LDAPLightweight Directory Access ProtocolThe Lightweight Directory Access Protocol is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network...
Lightweight Directory Access Protocol - MIMEMIMEMultipurpose Internet Mail Extensions is an Internet standard that extends the format of email to support:* Text in character sets other than ASCII* Non-text attachments* Message bodies with multiple parts...
, Multipurpose Internet Mail Extensions - MSNP, Microsoft Notification Protocol (used by Windows Live Messenger)
- MAPMobile Application PartThe Mobile Application Part is an SS7 protocol which provides an application layer for the various nodes in GSM and UMTS mobile core networks and GPRS core networks to communicate with each other in order to provide services to mobile phone users...
, Mobile Application Part - NetBIOSNetBIOSNetBIOS is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, NetBIOS is not a networking protocol...
, File Sharing and Name Resolution protocol - the basis of file sharing with Windows. - NNTPNetwork News Transfer ProtocolThe Network News Transfer Protocol is an Internet application protocol used for transporting Usenet news articles between news servers and for reading and posting articles by end user client applications...
, Network News Transfer Protocol - NTPNetwork Time ProtocolThe Network Time Protocol is a protocol and software implementation for synchronizing the clocks of computer systems over packet-switched, variable-latency data networks. Originally designed by David L...
, Network Time Protocol - NTCIPNational Transportation Communications for Intelligent Transportation System ProtocolThe National Transportation Communications for Intelligent Transportation System Protocol is a family of standards designed to achieve interoperability and interchangeability between computers and electronic traffic control equipment from different manufacturers.The protocol is the product of a...
, National Transportation Communications for Intelligent Transportation System Protocol - POP3Post Office ProtocolIn computing, the Post Office Protocol is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP and IMAP are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern...
Post Office Protocol Version 3 - RADIUSRADIUSRemote Authentication Dial In User Service is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for computers to connect and use a network service...
, an authentication, authorization and accounting protocol - RDPRDPRDP may refer to:* Radiodifusão Portuguesa, a subsidiary of Rádio e Televisão de Portugal* Rally for Democracy and Progress, a generic name for a multi-national political party* Rassemblement Démocratique et Populaire...
, Remote Desktop Protocol - RloginRloginrlogin is a software utility for Unix-like computer operating systems that allows users to log in on another host via a network, communicating via TCP port 513.It was first distributed as part of the 4.2BSD release....
, a UNIX remote login protocol - rsyncRsyncrsync is a software application and network protocol for Unix-like and Windows systems which synchronizes files and directories from one location to another while minimizing data transfer using delta encoding when appropriate. An important feature of rsync not found in most similar...
, a file transfer protocol for backups, copying and mirroring - RTPReal-time Transport ProtocolThe Real-time Transport Protocol defines a standardized packet format for delivering audio and video over IP networks. RTP is used extensively in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications, television services and...
, Real-time Transport Protocol - RTSP, Real-time Transport Streaming Protocol
- SSHSecure ShellSecure Shell is a network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that it connects via a secure channel over an insecure network: a server and a client...
, Secure Shell - SISNAPISISNAPISiebel Internet Session Network Application Programming Interface is a proprietary message format protocol used for communications between various Siebel application components...
, Siebel Internet Session Network API - SIPSession Initiation ProtocolThe Session Initiation Protocol is an IETF-defined signaling protocol widely used for controlling communication sessions such as voice and video calls over Internet Protocol . The protocol can be used for creating, modifying and terminating two-party or multiparty sessions...
, Session Initiation Protocol, a signaling protocol - SMTPSimple Mail Transfer ProtocolSimple Mail Transfer Protocol is an Internet standard for electronic mail transmission across Internet Protocol networks. SMTP was first defined by RFC 821 , and last updated by RFC 5321 which includes the extended SMTP additions, and is the protocol in widespread use today...
, Simple Mail Transfer Protocol - SNMPSimple Network Management ProtocolSimple Network Management Protocol is an "Internet-standard protocol for managing devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more." It is used mostly in network management systems to monitor...
, Simple Network Management Protocol - SOAP, Simple Object Access Protocol
- SMBServer Message BlockIn computer networking, Server Message Block , also known as Common Internet File System operates as an application-layer network protocol mainly used to provide shared access to files, printers, serial ports, and miscellaneous communications between nodes on a network. It also provides an...
, Microsoft Server Message Block Protocol - STUNSTUNSTUN is a standardized set of methods, including a network protocol, used in NAT traversal for applications of real-time voice, video, messaging, and other interactive IP communications....
, Session Traversal Utilities for NAT - TUP, Telephone User Part
- TelnetTELNETTelnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection...
, a remote terminal access protocol - TCAPTransaction Capabilities Application PartTransaction Capabilities Application Part, from ITU-T recommendations Q.771-Q.775 or ANSI T1.114 is a protocol for Signalling System 7 networks. Its primary purpose is to facilitate multiple concurrent dialogs between the same sub-systems on the same machines, using Transaction IDs to differentiate...
, Transaction Capabilities Application Part - TFTPTrivial File Transfer ProtocolTrivial File Transfer Protocol is a file transfer protocol known for its simplicity. It is generally used forautomated transfer of configuration or boot files between machines in a local environment....
, Trivial File Transfer Protocol, a simple file transfer protocol - WebDAVWebDAVWeb-based Distributed Authoring and Versioning is a set of methods based on the Hypertext Transfer Protocol that facilitates collaboration between users in editing and managing documents and files stored on World Wide Web servers...
, Web Distributed Authoring and Versioning - XMPPExtensible Messaging and Presence ProtocolExtensible Messaging and Presence Protocol is an open-standard communications protocol for message-oriented middleware based on XML . The protocol was originally named Jabber, and was developed by the Jabber open-source community in 1999 for near-real-time, extensible instant messaging , presence...
, an instant-messaging protocol
Protocol description languages
- Abstract Syntax Notation OneAbstract Syntax Notation OneData generated at various sources of observation need to be transmitted to one or more locations that process it to generate useful results. For example, voluminous signal data collected by a radio telescope from outer space. The system recording the data and the system processing it later may be...
(ASN.1) - Abstract Syntax Notation Two (ASN.2)
See also
- List of automation protocols
- Systems Network ArchitectureSystems Network ArchitectureSystems Network Architecture is IBM's proprietary networking architecture created in 1974. It is a complete protocol stack for interconnecting computers and their resources. SNA describes the protocol and is, in itself, not actually a program...
(SNA) developed by IBM - Distributed Systems Architecture (DSA) developed by Honeywell-Bull
- Distributed System Security ArchitectureDistributed System Security ArchitectureDistributed System Security Architecture or is a computer security architecture that provides a suite of functions including login, authentication, and access control in a distributed system...
(DSSA)
External links
- Protocol Encapsulation Chart - A PDF file illustrating the relationship between common protocols and the OSI Reference ModelOSI modelThe Open Systems Interconnection model is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a prescription of characterizing and standardizing the functions of a communications system in terms of abstraction layers. Similar...
. - Network Protocols Acronyms and Abbreviations - list of network protocols with abbreviations order by index.