Knowledge

Communication protocol

Source đź“ť

1833:, which assumes a connectionless network, RM/OSI assumed a connection-oriented network. Connection-oriented networks are more suitable for wide area networks and connectionless networks are more suitable for local area networks. Connection-oriented communication requires some form of session and (virtual) circuits, hence the (in the TCP/IP model lacking) session layer. The constituent members of ISO were mostly concerned with wide area networks, so the development of RM/OSI concentrated on connection-oriented networks and connectionless networks were first mentioned in an addendum to RM/OSI and later incorporated into an update to RM/OSI. 1011:. BSC is an early link-level protocol used to connect two separate nodes. It was originally not intended to be used in a multinode network, but doing so revealed several deficiencies of the protocol. In the absence of standardization, manufacturers and organizations felt free to enhance the protocol, creating incompatible versions on their networks. In some cases, this was deliberately done to discourage users from using equipment from other manufacturers. There are more than 50 variants of the original bi-sync protocol. One can assume, that a standard would have prevented at least some of this from happening. 902: 1895:
research are affected by metadata encryption; protocol designers must balance observability for operability and research against ossification resistance and end-user privacy. The IETF announced in 2014 that it had determined that large-scale surveillance of protocol operations is an attack due to the ability to infer information from the wire image about users and their behaviour, and that the IETF would "work to mitigate pervasive monitoring" in its protocol designs; this had not been done systematically previously. The
810: 877: 6625: 5612: 1028:). They can hold a market in a very negative grip, especially when used to scare away competition. From a historical perspective, standardization should be seen as a measure to counteract the ill-effects of de facto standards. Positive exceptions exist; a de facto standard operating system like Linux does not have this negative grip on its market, because the sources are published and maintained in an open way, thus inviting competition. 6635: 5622: 6645: 5601: 995:, which initiates the standardization process. The members of the standards organization agree to adhere to the work result on a voluntary basis. Often the members are in control of large market shares relevant to the protocol and in many cases, standards are enforced by law or the government because they are thought to serve an important public interest, so getting approval can be very important for the protocol. 5632: 466:. The functionalities are mapped onto the layers, each layer solving a distinct class of problems relating to, for instance: application-, transport-, internet- and network interface-functions. To transmit a message, a protocol has to be selected from each layer. The selection of the next protocol is accomplished by extending the message with a protocol selector for each layer. 1744:. To communicate, two peer entities at a given layer use a protocol specific to that layer which is implemented by using services of the layer below. For each layer, there are two types of standards: protocol standards defining how peer entities at a given layer communicate, and service standards defining how a given layer communicates with the layer above it. 1891:), which can influence protocol operation. Even if authenticated, if a portion is not encrypted, it will form part of the wire image, and intermediate parties may intervene depending on its content (e.g., dropping packets with particular flags). Signals deliberately intended for intermediary consumption may be left authenticated but unencrypted. 2109: 1781:
may provide the following services to the presentation layer: establishment and release of session connections, normal and expedited data exchange, a quarantine service which allows the sending presentation entity to instruct the receiving session entity not to release data to its presentation entity
1079:
International standards organizations are supposed to be more impartial than local organizations with a national or commercial self-interest to consider. Standards organizations also do research and development for standards of the future. In practice, the standards organizations mentioned, cooperate
817:
In modern protocol design, protocols are layered to form a protocol stack. Layering is a design principle that divides the protocol design task into smaller steps, each of which accomplishes a specific part, interacting with the other parts of the protocol only in a small number of well-defined ways.
431:
had proven to be a successful design approach for both compiler and operating system design and, given the similarities between programming languages and communication protocols, the originally monolithic networking programs were decomposed into cooperating protocols. This gave rise to the concept of
2599:
The authors wish to thank a number of colleagues for helpful comments during early discussions of international network protocols, especially R. Metcalfe, R. Scantlebury, D. Walden, and H. Zimmerman; D. Davies and L. Pouzin who constructively commented on the fragmentation and accounting issues; and
2523:
In the early 1970s Mr Pouzin created an innovative data network that linked locations in France, Italy and Britain. Its simplicity and efficiency pointed the way to a network that could connect not just dozens of machines, but millions of them. It captured the imagination of Dr Cerf and Dr Kahn, who
1867:
of a protocol is the information that a non-participant observer is able to glean from observing the protocol messages, including both information explicitly given meaning by the protocol, but also inferences made by the observer. Unencrypted protocol metadata is one source making up the wire image,
913:
To send a message on system A, the top-layer software module interacts with the module directly below it and hands over the message to be encapsulated. The lower module fills in the header data in accordance with the protocol it implements and interacts with the bottom module which sends the message
892:
is some kind of message flow diagram. To visualize protocol layering and protocol suites, a diagram of the message flows in and between two systems, A and B, is shown in figure 3. The systems, A and B, both make use of the same protocol suite. The vertical flows (and protocols) are in-system and the
2256:
As Kahn recalls: ... Paul Baran's contributions ... I also think Paul was motivated almost entirely by voice considerations. If you look at what he wrote, he was talking about switches that were low-cost electronics. The idea of putting powerful computers in these locations hadn't quite occurred to
1899:
recommended in 2023 that disclosure of information by a protocol to the network should be intentional, performed with the agreement of both recipient and sender, authenticated to the degree possible and necessary, only acted upon to the degree of its trustworthiness, and minimised and provided to a
1771:
may provide the following services to the application layer: a request for the establishment of a session, data transfer, negotiation of the syntax to be used between the application layers, any necessary syntax transformations, formatting and special purpose transformations (e.g., data compression
780:
is the synchronization of software for receiving and transmitting messages of communication in proper sequencing. Concurrent programming has traditionally been a topic in operating systems theory texts. Formal verification seems indispensable because concurrent programs are notorious for the hidden
411:
To implement a networking protocol, the protocol software modules are interfaced with a framework implemented on the machine's operating system. This framework implements the networking functionality of the operating system. When protocol algorithms are expressed in a portable programming language
1801:
does the setup, maintenance and release of network paths between transport peer entities. When relays are needed, routing and relay functions are provided by this layer. The quality of service is negotiated between network and transport entities at the time the connection is set up. This layer is
1757:
may provide the following services to the application processes: identification of the intended communication partners, establishment of the necessary authority to communicate, determination of availability and authentication of the partners, agreement on privacy mechanisms for the communication,
800:
The literature presents numerous analogies between computer communication and programming. In analogy, a transfer mechanism of a protocol is comparable to a central processing unit (CPU). The framework introduces rules that allow the programmer to design cooperating protocols independently of one
693:
Error detection is necessary on networks where data corruption is possible. In a common approach, a CRC of the data area is added to the end of packets, making it possible for the receiver to detect differences caused by corruption. The receiver rejects the packets on CRC differences and arranges
646:
Addresses are used to identify both the sender and the intended receiver(s). The addresses are carried in the header area of the bitstrings, allowing the receivers to determine whether the bitstrings are of interest and should be processed or should be ignored. A connection between a sender and a
987:
For communication to occur, protocols have to be selected. The rules can be expressed by algorithms and data structures. Hardware and operating system independence is enhanced by expressing the algorithms in a portable programming language. Source independence of the specification provides wider
936:
Although the use of protocol layering is today ubiquitous across the field of computer networking, it has been historically criticized by many researchers as abstracting the protocol stack in this way may cause a higher layer to duplicate the functionality of a lower layer, a prime example being
923:
The modules below the application layer are generally considered part of the operating system. Passing data between these modules is much less expensive than passing data between an application program and the transport layer. The boundary between the application layer and the transport layer is
2329:
Paul Baran ... focused on the routing procedures and on the survivability of distributed communication systems in a hostile environment, but did not concentrate on the need for resource sharing in its form as we now understand it; indeed, the concept of a software switch was not present in his
1894:
The wire image can be deliberately engineered, encrypting parts that intermediaries should not be able to observe and providing signals for what they should be able to. If provided signals are decoupled from the protocol's operation, they may become untrustworthy. Benign network management and
1735:
In the OSI model, communicating systems are assumed to be connected by an underlying physical medium providing a basic transmission mechanism. The layers above it are numbered. Each layer provides service to the layer above it using the services of the layer immediately below it. The top layer
1104:
In the ISO, the standardization process starts off with the commissioning of a sub-committee workgroup. The workgroup issues working drafts and discussion documents to interested parties (including other standards bodies) in order to provoke discussion and comments. This will generate a lot of
747:
If long bitstrings are divided into pieces and then sent on the network individually, the pieces may get lost or delayed or, on some types of networks, take different routes to their destination. As a result, pieces may arrive out of sequence. Retransmissions can result in duplicate pieces. By
2001:
combines both function and domain of use. The dominant layering schemes are the ones developed by the IETF and by ISO. Despite the fact that the underlying assumptions of the layering schemes are different enough to warrant distinguishing the two, it is a common practice to compare the two by
772:
principles have been applied to create a set of common network protocol design principles. The design of complex protocols often involves decomposition into simpler, cooperating protocols. Such a set of cooperating protocols is sometimes called a protocol family or a protocol suite, within a
68:
Communicating systems use well-defined formats for exchanging various messages. Each message has an exact meaning intended to elicit a response from a range of possible responses predetermined for that particular situation. The specified behavior is typically independent of how it is to be
1762:, synchronization between cooperating application processes, identification of any constraints on syntax (e.g. character sets and data structures), determination of cost and acceptable quality of service, selection of the dialogue discipline, including required logon and logoff procedures. 2075:
Failure to receive an acknowledgment indicates that either the original transmission or the acknowledgment was lost. The sender has no means to distinguish these cases and therefore, to ensure all data is received, must make the conservative assumption that the original transmission was
1083:
Multiple standards bodies may be involved in the development of a protocol. If they are uncoordinated, then the result may be multiple, incompatible definitions of a protocol, or multiple, incompatible interpretations of messages; important invariants in one definition (e.g., that
884:
Protocol layering forms the basis of protocol design. It allows the decomposition of single, complex protocols into simpler, cooperating protocols. The protocol layers each solve a distinct class of communication problems. Together, the layers make up a layering scheme or model.
4475:
Papastergiou, Giorgos; Fairhurst, Gorry; Ros, David; Brunstrom, Anna; Grinnemo, Karl-Johan; Hurtig, Per; Khademi, Naeem; TĂĽxen, Michael; Welzl, Michael; Damjanovic, Dragana; Mangiante, Simone (2017). "De-Ossifying the Internet Transport Layer: A Survey and Future Perspectives".
1836:
At the time, the IETF had to cope with this and the fact that the Internet needed protocols that simply were not there. As a result, the IETF developed its own standardization process based on "rough consensus and running code". The standardization process is described by
607:
Getting the data across a network is only part of the problem for a protocol. The data received has to be evaluated in the context of the progress of the conversation, so a protocol must include rules describing the context. These kinds of rules are said to express the
1791:
provides reliable and transparent data transfer in a cost-effective way as required by the selected quality of service. It may support the multiplexing of several transport connections on to one network connection or split one transport connection into several network
399:
Operating systems usually contain a set of cooperating processes that manipulate shared data to communicate with each other. This communication is governed by well-understood protocols, which can be embedded in the process code itself. In contrast, because there is no
1056:(IETF). The IETF maintains the protocols in use on the Internet. The IEEE controls many software and hardware protocols in the electronics industry for commercial and consumer devices. The ITU is an umbrella organization of telecommunication engineers designing the 905:
Figure 5: Protocol and software layering. The software modules implementing the protocols are represented by cubes. The information flow between the modules is represented by arrows. The (top two horizontal) red arrows are virtual. The blue lines mark the layer
1815:
does the setup, maintenance and release of data link connections. Errors occurring in the physical layer are detected and may be corrected. Errors are reported to the network layer. The exchange of data link units (including flow control) is defined by this
1728:(such as layered protocols) and their standardization. This would prevent protocol standards with overlapping functionality and would allow clear definition of the responsibilities of a protocol at the different levels (layers). This gave rise to the 1848:
Nowadays, the IETF has become a standards organization for the protocols in use on the Internet. RM/OSI has extended its model to include connectionless services and because of this, both TCP and IP could be developed into international standards.
1782:
without permission, interaction management so presentation entities can control whose turn it is to perform certain control functions, resynchronization of a session connection, reporting of unrecoverable exceptions to the presentation entity.
236:
responsible for the reliable delivery of data on a packet-switched network, rather than this being a service of the network itself. His team was the first to tackle the highly complex problem of providing user applications with a reliable
655:
s address could be taken to mean an addressing of all stations on the network, so sending to this address would result in a broadcast on the local network. The rules describing the meanings of the address value are collectively called an
383:
The information exchanged between devices through a network or other media is governed by rules and conventions that can be set out in communication protocol specifications. The nature of communication, the actual data exchanged and any
710:
Packets may be lost on the network or be delayed in transit. To cope with this, under some protocols, a sender may expect an acknowledgment of correct reception from the receiver within a certain amount of time. Thus, on
715:, the sender may need to retransmit the information. In case of a permanently broken link, the retransmission has no effect, so the number of retransmissions is limited. Exceeding the retry limit is considered an error. 893:
horizontal message flows (and protocols) are between systems. The message flows are governed by rules, and data formats specified by protocols. The blue lines mark the boundaries of the (horizontal) protocol layers.
666:
Sometimes protocols need to map addresses of one scheme on addresses of another scheme. For instance, to translate a logical IP address specified by the application to an Ethernet MAC address. This is referred to as
2257:
him as being cost effective. So the idea of computer switches was missing. The whole notion of protocols didn't exist at that time. And the idea of computer-to-computer communications was really a secondary concern.
1963:
protocol metadata, and ensuring that extension points are exercised and wire image variability is exhibited as fully as possible; remedying existing ossification requires coordination across protocol participants.
848:
was developed internationally based on experience with networks that predated the internet as a reference model for general communication with much stricter rules of protocol interaction and rigorous layering.
754:
Flow control is needed when the sender transmits faster than the receiver or intermediate network equipment can process the transmissions. Flow control can be implemented by messaging from receiver to sender.
619:
Messages are sent and received on communicating systems to establish communication. Protocols should therefore specify rules governing the transmission. In general, much of the following should be addressed:
760:
Communicating processes or state machines employ queues (or "buffers"), usually FIFO queues, to deal with the messages in the order sent, and may sometimes have multiple queues with different prioritization.
932:
Strictly adhering to a layered model, a practice known as strict layering, is not always the best approach to networking. Strict layering can have a negative impact on the performance of an implementation.
914:
over the communications channel to the bottom module of system B. On the receiving system B the reverse happens, so ultimately the message gets delivered in its original form to the top module of system B.
579:
encoding. Binary protocols are intended to be read by a machine rather than a human being. Binary protocols have the advantage of terseness, which translates into speed of transmission and interpretation.
627:
Digital message bitstrings are exchanged. The bitstrings are divided in fields and each field carries information relevant to the protocol. Conceptually the bitstring is divided into two parts called the
1929:
that are sensitive to the wire image of the protocol, and which can interrupt or interfere with messages that are valid but which the middlebox does not correctly recognize. This is a violation of the
920:
is divided into subproblems. As a result, the translation software is layered as well, allowing the software layers to be designed independently. The same approach can be seen in the TCP/IP layering.
3414:
F. Buschmann, K. Henney, and D. C. Schmidt, Pattern-Oriented Software Architecture Volume 4: A Pattern Language for Distributed Computing, Volume 4 edition. Chichester England; New York: Wiley, 2007.
1940:
protocol design and deployment, as it can prevent new protocols or extensions from being deployed on the Internet, or place strictures on the design of new protocols; new protocols may have to be
532:
Network applications have various methods of encapsulating data. One method very common with Internet protocols is a text oriented representation that transmits requests and responses as lines of
96:
Multiple protocols often describe different aspects of a single communication. A group of protocols designed to work together is known as a protocol suite; when implemented in software they are a
856:
in the Internet. Packet relaying across networks happens over another layer that involves only network link technologies, which are often specific to certain physical layer technologies, such as
681:
to the intended receiver(s) need to forward messages on behalf of the sender. On the Internet, the networks are connected using routers. The interconnection of networks through routers is called
2487:
In addition to the NPL Network and the ARPANET, CYCLADES, an academic and research experimental network, also played an important role in the development of computer networking technologies
829:
are designed to function in diverse and complex settings. Internet protocols are designed for simplicity and modularity and fit into a coarse hierarchy of functional layers defined in the
748:
marking the pieces with sequence information at the sender, the receiver can determine what was lost or duplicated, ask for necessary retransmissions and reassemble the original message.
2033:
for transport. In the common case of TCP and UDP, services are distinguished by port numbers. Conformance to these port numbers is voluntary, so in content inspection systems the term
555:
Text-based protocols are typically optimized for human parsing and interpretation and are therefore suitable whenever human inspection of protocol contents is required, such as during
797:. Mealy and Moore machines are in use as design tools in digital electronics systems encountered in the form of hardware used in telecommunication or electronic devices in general. 1825:
describes details like the electrical characteristics of the physical connection, the transmission techniques used, and the setup, maintenance and clearing of physical connections.
880:
Figure 3. Message flows using a protocol suite. Black loops show the actual messaging loops, red loops are the effective communication between layers enabled by the lower layers.
1724:, the predecessor of the Internet, was that protocols need a framework to operate. It is therefore important to develop a general-purpose, future-proof framework suitable for 1900:
minimum number of entities. Engineering the wire image and controlling what signals are provided to network elements was a "developing field" in 2023, according to the IAB.
852:
Typically, application software is built upon a robust data transport layer. Underlying this transport layer is a datagram delivery and routing mechanism that is typically
2457:
In fact, CYCLADES, unlike ARPANET, had been explicitly designed to facilitate internetworking; it could, for instance, handle varying formats and varying levels of service
612:
of the communication. Other rules determine whether the data is meaningful for the context in which the exchange takes place. These kinds of rules are said to express the
521:
The immediate human readability stands in contrast to native binary protocols which have inherent benefits for use in a computer environment (such as ease of mechanical
536:
text, terminated by a newline character (and usually a carriage return character). Examples of protocols that use plain, human-readable text for its commands are FTP (
3331: 3254:
Comer 2000, Sect. 11.3 - The Conceptual Layers Of Protocol Software, p. 179, the first two paragraphs describe the sending of a message through successive layers.
2903:
Marsden 1986, Section 6.1 - Why are standards necessary?, p. 64-65, uses BSC as an example to show the need for both standard protocols and a standard framework.
2858: 2499: 636:. The actual message is carried in the payload. The header area contains the fields with relevance to the operation of the protocol. Bitstrings longer than the 841:(IP) resulted from the decomposition of the original Transmission Control Program, a monolithic communication protocol, into this layered communication suite. 2912:
Comer 2000, Sect. 11.2 - The Need For Multiple Protocols, p. 177, explains this by drawing analogies between computer communication and programming languages.
3290:
Comer 2000, Sect. 11.10 - The Disadvantage Of Layering, p. 192, explains why "strict layering can be extremely inefficient" giving examples of optimizations.
3149:
Marsden 1986, Section 3.3 - Acknowledgement, p. 28-33, explains the advantages of positive only acknowledgment and mentions datagram protocols as exceptions.
2100:, Hilpisch, Robert E.; Duchscher, Rob & Seel, Mark et al., "Wireless communication protocol", published 2009-05-05, assigned to 2826: 1872:
including packet timing also contribute. Different observers with different vantages may see different wire images. The wire image is relevant to end-user
4876: 1992:, which is used to encapsulate packets in a high-level protocol so that the packets can be passed across a transport system using the high-level protocol. 2583: 2156:
Comer 2000, Sect. 11.2 - The Need For Multiple Protocols, p. 177, "They (protocols) are to communication what programming languages are to computation"
3113:
Comer 2000, Sect. 7.7.4 - Datagram Size, Network MTU, and Fragmentation, p. 104, Explains fragmentation and the effect on the header of the fragments.
2972: 1049: 2945:
Comer 2000, Sect. 11.3 - The Conceptual Layers Of Protocol Software, p. 178, "Each layer takes responsibility for handling one part of the problem."
3263:
Comer 2000, Sect. 11.2 - The need for multiple protocols, p. 178, explains similarities protocol software and compiler, assembler, linker, loader.
1041: 962: 112: 3654:
This Basic Reference Model of Open Systems Interconnection is based on the assumption that a connection is required for the transfer of data.
435:
Systems typically do not use a single protocol to handle a transmission. Instead they use a set of cooperating protocols, sometimes called a
167: 4142:
Describes TCP/IP to the implementors of protocolsoftware. In particular the introduction gives an overview of the design goals of the suite.
1732:(OSI model), which is used as a framework for the design of standard protocols and services conforming to the various layer specifications. 5584: 5556: 5551: 4576: 5668: 4478: 2133: 3223: 3049: 73:. Communication protocols have to be agreed upon by the parties involved. To reach an agreement, a protocol may be developed into a 3532:"X.225 : Information technology – Open Systems Interconnection – Connection-oriented Session protocol: Protocol specification" 474:
There are two types of communication protocols, based on their representation of the content being carried: text-based and binary.
1014:
In some cases, protocols gain market dominance without going through a standardization process. Such protocols are referred to as
1069: 596: 3167:
Marsden 1986, Section 3.5 - Direction of information flow, p. 34-35, explains master/slave and the negotiations to gain control.
6378: 6350: 5578: 3281:
IETF 1989, Sect 1.3.1 - Organization, p. 15, 2nd paragraph: many design choices involve creative "breaking" of strict layering.
2247: 1604: 910:
The software supporting protocols has a layered organization and its relationship with protocol layering is shown in figure 5.
3706:
Comer 2000, Section 1.9 - Internet Protocols And Standardization, p. 12, explains why the IETF did not use existing protocols.
6403: 5573: 5563: 5543: 5345: 4528: 4367:
Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols
3668:
ISO 7498:1984/ADD 1:1987 – Information processing systems — Open Systems Interconnection — Basic Reference Model — Addendum 1
3535: 2751: 2450: 2280: 2191: 1568: 1045: 781:
and sophisticated bugs they contain. A mathematical approach to the study of concurrency and communication is referred to as
6254: 3140:
Marsden 1986, Section 3.2 - Detection and transmission errors, p. 27, explains the advantages of backward error correction.
3022: 2995: 1370: 1365: 1238: 4710: 1117:. International standards are reissued periodically to handle the deficiencies and reflect changing views on the subject. 6408: 5687: 5635: 5568: 5414: 1707: 1227: 290: 1956:
on the Internet, and TCP itself has significantly ossified, making extension or modification of the protocol difficult.
1736:
provides services to the application process. The layers communicate with each other by means of an interface, called a
979:
models are used to formally describe the possible interactions of the protocol. and communicating finite-state machines
5920: 5340: 3335: 2775: 1729: 1433: 1217: 782: 360:, laid the foundation for the growth of TCP/IP as a comprehensive protocol suite as the core component of the emerging 301:
in 1975 but was not adopted by the CCITT nor by the ARPANET. Separate international research, particularly the work of
4110:
In particular Ch.11 Protocol layering. Also has a RFC guide and a Glossary of Internetworking Terms and Abbreviations.
2851: 1980:
Classification schemes for protocols usually focus on the domain of use and function. As an example of domain of use,
860:. Layering provides opportunities to exchange technologies when needed, for example, protocols are often stacked in a 388:-dependent behaviors, is defined by these specifications. In digital computing systems, the rules can be expressed by 6669: 6560: 6388: 5925: 5434: 4242: 4220: 4201: 4182: 4158: 4103: 4081: 4053: 3841: 3399: 3387: 3176:
Marsden 1986, Section 3.6 - Sequence control, p. 35-36, explains how packets get lost and how sequencing solves this.
2388: 1418: 1321: 1057: 1004: 701: 194: 124: 3853: 3104:
Marsden 1986, Chapter 3 - Fundamental protocol concepts and problem areas, p. 26-42, explains much of the following.
2170:
Comer 2000, Sect. 1.3 - Internet Services, p. 3, "Protocols are to communication what algorithms are to computation"
1109:
is produced by the working group. After feedback, modification, and compromise the proposal reaches the status of a
408:. Transmission is not necessarily reliable, and individual systems may use different hardware or operating systems. 6648: 5749: 5219: 4767: 4569: 1619: 1499: 1162: 4544: 6036: 5330: 2819: 1514: 1053: 738: 371:, published in 1984. For a period in the late 1980s and early 1990s, engineers, organizations and nations became 104: 2208: 6327: 6289: 5953: 5661: 5325: 2552: 2480: 1988:
are used on connection-oriented networks and connectionless networks respectively. An example of function is a
1624: 1152: 966: 734: 54: 3521:
Marsden 1986, Section 6.4 - Some problems with standardisation, p. 67, follows HDLC to illustrate the process.
888:
Computations deal with algorithms and data; Communication involves protocols and messages; So the analog of a
81:
describes the same for computations, so there is a close analogy between protocols and programming languages:
6469: 6446: 6176: 6166: 5350: 1945: 1504: 1489: 1355: 1316: 1212: 834: 541: 246: 945:
Commonly recurring problems in the design and implementation of communication protocols can be addressed by
864:
arrangement to accommodate the connection of dissimilar networks. For example, IP may be tunneled across an
375:, the OSI model or the Internet protocol suite, would result in the best and most robust computer networks. 213:
to connect across the ARPANET by implementing higher-level communication protocols, an early example of the
6550: 6138: 6046: 5958: 5734: 5719: 5625: 5386: 5283: 4826: 4621: 4593: 2964: 2101: 1981: 1494: 1438: 1326: 1265: 958: 575:, as opposed to a text-based protocol which only uses values corresponding to human-readable characters in 318: 271: 42: 1944:
in an already-deployed protocol or mimic the wire image of another protocol. Because of ossification, the
6638: 6373: 5878: 5615: 5122: 4562: 3865: 3574:
Marsden 1986, Section 14.3 - Layering concepts and general definitions, p. 183-185, explains terminology.
3245:
Comer 2000, Sect. 11.2 - The Need For Multiple Protocols, p. 177, introduces the decomposition in layers.
3131:
Marsden 1986, Section 14.3 - Layering concepts and general definitions, p. 187, explains address mapping.
2954:
Comer 2000, Sect. 11.11 - The Basic Idea Behind Multiplexing And Demultiplexing, p. 192, states the same.
2924:
Sect. 11.10 - The Disadvantage Of Layering, p. 192, states: layering forms the basis for protocol design.
1896: 1484: 1182: 1157: 2539: 2002:
relating common protocols to the layers of the two schemes. The layering scheme from the IETF is called
6679: 6674: 6610: 6259: 5474: 5396: 5335: 5042: 3556:
Marsden 1986, Section 6.1 - Why are standards necessary?, p. 65, explains lessons learned from ARPANET.
2698:
Rybczynski, Tony (2009). "Commercialization of packet switching (1975-1985): A Canadian perspective ".
2655:
Schwartz, Mischa (2010). "X.25 Virtual Circuits - TRANSPAC IN France - Pre-Internet Data Networking ".
2050: 1941: 1534: 1479: 1202: 865: 3272:
Comer 2000, Sect. 11.9.1 - Operating System Boundary, p. 192, describes the operating system boundary.
2129: 2097: 1105:
questions, much discussion and usually some disagreement. These comments are taken into account and a
6628: 6555: 6530: 6393: 6041: 5654: 5246: 5207: 5052: 4952: 4881: 4814: 4641: 3693:
ISO 7498:1994 – Information processing systems - Open Systems Interconnection - Basic Reference Model
3649:
ISO 7498:1984 – Information processing systems - Open Systems Interconnection - Basic Reference Model
3361:. ICSEA 2016, The Eleventh International Conference on Software Engineering Advances. pp. 22–30. 1634: 1509: 1073: 637: 128: 6479: 6312: 5905: 5774: 5605: 4847: 4782: 4735: 4695: 1280: 385: 3889: 3829: 3083: 462:
The protocols can be arranged based on functionality in groups, for instance, there is a group of
111:(Institute of Electrical and Electronics Engineers) handles wired and wireless networking and the 6540: 6474: 6365: 6181: 5848: 5444: 5429: 5273: 5224: 5147: 5047: 4725: 4611: 4606: 2349: 1985: 1700: 1639: 1629: 1554: 946: 830: 819: 721:
Direction needs to be addressed if transmissions can only occur in one direction at a time as on
341: 6605: 6436: 6317: 6084: 6074: 6069: 5152: 4967: 4912: 4907: 4720: 4685: 3877: 2412:"Designed for Change: End-to-End Arguments, Internet Innovation, and the Net Neutrality Debate" 1949: 1360: 1172: 1037: 992: 777: 537: 396:. Protocols are to communication what algorithms or programming languages are to computations. 2891:
Ben-Ari 1982, Section 2.7 - Summary, p. 27, summarizes the concurrent programming abstraction.
2741: 2612:
McKenzie, Alexander (2011). "INWG and the Conception of the Internet: An Eyewitness Account".
2440: 2364: 2270: 2181: 6575: 6545: 6535: 6431: 6345: 6221: 6161: 6128: 6118: 6008: 5973: 5963: 5900: 5769: 5744: 5739: 5704: 5268: 5072: 5037: 4957: 4937: 4859: 4747: 4668: 2470: 2123: 1914: 1909: 1529: 1458: 1197: 491: 326: 264: 26: 4601: 3374:
Service Design Patterns: Fundamental Design Solutions for SOAP/WSDL and RESTful Web Services
2882:
Ben-Ari 1982, chapter 2 - The concurrent programming abstraction, p. 18-19, states the same.
2287:
Baran had put more emphasis on digital voice communications than on computer communications.
6335: 6307: 6279: 6274: 6103: 6079: 6031: 6016: 5998: 5988: 5983: 5945: 5895: 5890: 5807: 5753: 5182: 5142: 5112: 4869: 4804: 4626: 4437: 4409: 4381: 4353: 4325: 4297: 4269: 4134: 2342: 1930: 1524: 976: 786: 730: 526: 314: 229: 210: 78: 3229: 3053: 2411: 2021:
In networking equipment configuration, a term-of-art distinction is often drawn: The term
8: 6600: 6525: 6441: 6426: 6191: 5978: 5935: 5930: 5827: 5817: 5789: 5192: 5132: 4891: 4853: 4651: 4636: 4230: 4061: 2252:
Entrepreneurial Capitalism and Innovation: A History of Computer Communications 1968–1988
1869: 1747:
In the OSI model, the layers and their functionality are (from highest to lowest layer):
1285: 1192: 1089: 917: 769: 712: 405: 242: 2798: 2343:
Interface Message Processor: Specifications for the Interconnection of a Host and an IMP
1020:. De facto standards are common in emerging markets, niche markets, or markets that are 6565: 6464: 6340: 6297: 6206: 6148: 6133: 6123: 5915: 5714: 5419: 5376: 5307: 5177: 5107: 5082: 5017: 4864: 4585: 4518: 4505: 4067: 4027:
Comer 2000, Sect. 11.5.1 - The TCP/IP 5-Layer Reference Model, p. 183, states the same.
3483: 3450:
Comer 2000, Glossary of Internetworking Terms and Abbreviations, p. 704, term protocol.
2723: 2680: 2637: 2228: 1989: 1972:
transport protocol to have been designed with deliberate anti-ossification properties.
1953: 1803: 1767: 1693: 1253: 1167: 1065: 861: 813:
The TCP/IP model or Internet layering scheme and its relation to some common protocols.
463: 120: 74: 6585: 6515: 6494: 6456: 6264: 6231: 6211: 5910: 5822: 5696: 5459: 5381: 5295: 5278: 5241: 5087: 4917: 4886: 4752: 4646: 4524: 4238: 4216: 4197: 4178: 4154: 4099: 4077: 4049: 3937: 3901: 3500:
Marsden 1986, Section 6.3 - Advantages of standardization, p. 66-67, states the same.
3437: 3395: 2747: 2715: 2672: 2641: 2629: 2575: 2507: 2476: 2446: 2320: 2276: 2187: 1922: 1753: 1401: 1177: 1145: 1134: 1016: 889: 838: 428: 302: 171: 58: 34: 5127: 3681:
Marsden 1986, Section 14.11 - Connectionless mode and RM/OSI, p. 195, mentions this.
3487: 2727: 2684: 270:
Research in the early 1970s by Bob Kahn and Vint Cerf led to the formulation of the
6418: 6302: 6269: 6064: 5993: 5882: 5868: 5863: 5812: 5799: 5724: 5677: 5464: 5424: 5404: 5371: 5300: 5258: 5172: 5027: 5012: 4987: 4962: 4922: 4772: 4631: 4616: 4509: 4495: 4487: 4461: 4453: 4427: 4399: 4371: 4343: 4315: 4287: 4259: 4124: 4091: 3949: 3473: 3433: 2707: 2664: 2621: 2567: 2312: 2232: 2220: 2055: 1933:. Secondary causes include inflexibility in endpoint implementations of protocols. 1873: 1838: 507: 413: 353: 345: 275: 163: 154:
in a modern data-commutation context occurs in April 1967 in a memorandum entitled
4009: 3531: 2936:
Comer 2000, Sect. 11.2 - The Need For Multiple Protocols, p. 177, states the same.
991:
Protocol standards are commonly created by obtaining the approval or support of a
583:
Binary have been used in the normative documents describing modern standards like
6489: 6383: 6355: 6249: 6201: 6186: 6171: 6026: 6021: 5968: 5858: 5832: 5784: 5729: 5092: 4947: 4715: 4690: 4678: 3925: 3913: 3158:
Marsden 1986, Section 3.4 - Loss of information - timeouts and retries, p. 33-34.
1811: 1787: 1472: 1348: 901: 683: 549: 310: 252: 238: 186: 46: 4440: 4421: 4412: 4393: 4384: 4365: 4356: 4337: 4328: 4309: 4300: 4281: 4272: 4253: 4137: 4118: 3026: 2999: 1842: 1003:
The need for protocol standards can be shown by looking at what happened to the
357: 349: 6595: 6499: 6398: 6244: 6216: 5290: 5162: 5137: 5097: 5067: 4942: 4777: 4730: 4705: 4663: 4491: 2366:
UGC -NET/JRF/SET PTP & Guide Teaching and Research Aptitude: UGC -NET By HD
2300: 1821: 1759: 1587: 853: 436: 393: 367:
International work on a reference model for communication standards led to the
279: 256: 233: 97: 70: 2711: 2668: 2571: 2041:
is often used to refer to protocols identified through inspection signatures.
6663: 6484: 5779: 5439: 5212: 5202: 5117: 5007: 5002: 4992: 4977: 4799: 4658: 4041: 3756: 3754: 2803: 2719: 2676: 2633: 2579: 2511: 2324: 1918: 1884: 1877: 1797: 1777: 1394: 1299: 1093: 794: 790: 726: 401: 372: 198: 159: 145: 83:
protocols are to communication what programming languages are to computations
50: 4457: 3424:
Bochmann, G. (1978). "Finite state description of communication protocols".
2767: 2524:
included aspects of its design in the protocols that now power the internet.
2472:
Internationalising the Internet the Co-evolution of Influence and Technology
2316: 2224: 818:
Layering allows the parts of a protocol to be designed and tested without a
286:
and Carl Sunshine in December 1974, still a monolithic design at this time.
6580: 6239: 5317: 5157: 5102: 5032: 4997: 4932: 4831: 4821: 4673: 4071: 4046:
Interconnections: Bridges, Routers, Switches, and Internetworking Protocols
3592:
Marsden 1986, Section 14.5 - The presentation layer, p. 189, explains this.
2436: 1758:
agreement on responsibility for error recovery and procedures for ensuring
1207: 1085: 741:
where two parties respectively simultaneously transmit or wish to transmit.
704:. Acknowledgments are sent from receivers back to their respective senders. 417: 404:, communicating systems have to communicate with each other using a shared 313:, which was adopted by the CCITT in 1976. Computer manufacturers developed 225: 4549: 3751: 3691: 3666: 3647: 3583:
Marsden 1986, Section 14.4 - The application layer, p. 188, explains this.
3478: 3461: 2380: 340:
in 1982 and on the ARPANET in January 1983. The development of a complete
6570: 6196: 6108: 5517: 5167: 5077: 5062: 5022: 4982: 4841: 2600:
S. Crocker who commented on the creation and destruction of associations.
1888: 1659: 1654: 1649: 1573: 1544: 722: 283: 175: 30: 4423:
Considerations on Application - Network Collaboration Using Path Signals
3637:
Marsden 1986, Section 14.10 - The physical layer, p. 195, explains this.
3628:
Marsden 1986, Section 14.9 - The data link layer, p. 194, explains this.
3610:
Marsden 1986, Section 14.7 - The transport layer, p. 191, explains this.
3212:
Hoare 1985, Chapter 4 - Communication, p. 133, deals with communication.
2625: 677:
When systems are not directly connected, intermediary systems along the
332:
TCP software was redesigned as a modular protocol stack, referred to as
6590: 6520: 6113: 5853: 5709: 5522: 5229: 4927: 4836: 4792: 4762: 4740: 4168: 4146: 4114: 1960: 1644: 1539: 1519: 1306: 495: 202: 4466: 4420:
Arkko, Jari; Hardie, Ted; Pauly, Tommy; KĂĽhlewind, Mirja (July 2023).
3997: 3619:
Marsden 1986, Section 14.8 - The network layer, p. 192, explains this.
3601:
Marsden 1986, Section 14.6 - The session layer, p. 190, explains this.
2820:"Rough Consensus and Running Code' and the Internet-OSI Standards War" 6095: 6056: 5507: 4972: 4787: 4554: 4500: 4432: 4404: 4376: 4348: 4320: 4292: 4264: 4129: 2209:"Data Communications at the National Physical Laboratory (1965-1975)" 1926: 1858: 1679: 1664: 1448: 1128: 1025: 845: 556: 456: 432:
layered protocols which nowadays forms the basis of protocol design.
421: 389: 368: 206: 88: 4096:
Internetworking with TCP/IP - Principles, Protocols and Architecture
809: 185:, the starting point for host-to-host communication in 1969 was the 6156: 5646: 5502: 5492: 5409: 5234: 5057: 4550:
Overview of protocols in telecontrol field with OSI Reference Model
4060:. In particular Ch. 18 on "network design folklore", which is also 3961: 1937: 1021: 857: 826: 776:
Communicating systems operate concurrently. An important aspect of
361: 294: 260: 221: 190: 62: 4450:
Implementing Real-Time Transport Services over an Ossified Network
3729: 3727: 3714: 3712: 3565:
Marsden 1986, Section 14.1 - Introduction, p. 181, introduces OSI.
3376:(1 ed.). Upper Saddle River, NJ: Addison-Wesley Professional. 2417:. Information Technology and Innovation Foundation. pp. 7, 11 5497: 5482: 4700: 4474: 3973: 3955: 3943: 3931: 3919: 3819: 3817: 3790: 3122:
Comer 2000, Chapter 4 - Classful Internet Addresses, p. 64-67;71.
2058: â€“ Programming tool to build network connectivity components 1721: 1380: 1311: 1232: 937:
error recovery on both a per-link basis and an end-to-end basis.
522: 444: 182: 3359:
A Pattern Language for Application-level Communication Protocols
876: 700:
Acknowledgement of correct reception of packets is required for
599:. An interface in UML may also be considered a binary protocol. 5527: 5487: 4809: 4448:
McQuistin, Stephen; Perkins, Colin; Fayed, Marwan (July 2016).
3778: 3766: 3739: 3724: 3709: 2105: 1887:, it is subject to modification by intermediate parties (i.e., 1599: 1594: 1422: 1222: 1186: 592: 588: 440: 337: 322: 38: 3814: 3802: 957:
Popular formal methods of describing communication syntax are
5512: 5449: 4757: 1614: 1609: 1443: 1428: 1331: 1275: 1270: 1076:(W3C) produces protocols and standards for Web technologies. 1061: 651:. Usually, some address values have special meanings. An all- 584: 576: 533: 503: 499: 452: 298: 116: 193:, which defined the transmission of messages to an IMP. The 5454: 2096: 1969: 1965: 1883:
If some portion of the wire image is not cryptographically
1669: 1563: 1559: 1549: 1453: 1411: 1406: 1375: 1260: 970: 572: 545: 515: 448: 306: 209:, was first implemented in 1970. The NCP interface allowed 131:, the standards are also being driven towards convergence. 108: 25:
is a system of rules that allows two or more entities of a
4520:
History of the Internet: A Chronology, 1843 to the Present
4172: 3332:"Communication-protocol Design Patterns (CommDP) - COMMDP" 3300:
Wakeman, I (January 1992). "Layering considered harmful".
733:. Arrangements have to be made to accommodate the case of 156:
A Protocol for Use in the NPL Data Communications Network.
4419: 3907: 3895: 3883: 3871: 3859: 3847: 3835: 3503: 2965:"Data Communication - an overview | ScienceDirect Topics" 1674: 1008: 511: 4252:
Bryant, Stewart; Morrow, Monique, eds. (November 2009).
16:
System for exchanging messages between computing systems
4120:
Requirements for Internet Hosts -- Communication Layers
3075: 2743:
The "Hidden" Prehistory of European Research Networking
1959:
Recommended methods of preventing ossification include
3985: 3241: 3239: 103:
Internet communication protocols are published by the
4447: 4255:
Uncoordinated Protocol Development Considered Harmful
3967: 2025:
strictly refers to the transport layer, and the term
559:
and during early protocol development design phases.
4395:
Long-Term Viability of Protocol Extension Mechanisms
4237:(10th Print ed.). Prentice Hall International. 4196:(10th Print ed.). Prentice Hall International. 4177:(10th Print ed.). Prentice Hall International. 4153:(10th Print ed.). Prentice Hall International. 4229: 3394:(1 ed.). Boston: Addison-Wesley Professional. 3236: 3185:
Marsden 1986, Section 3.7 - Flow control, p. 36-38.
4307: 4066: 3850:, 2.2. Control of the Distribution of Information. 3796: 3784: 3772: 3745: 3733: 3718: 3330:Lascano, Jorge Edison; Clyde, Stephen; Raza, Ali. 2553:"A Protocol for Packet Network Intercommunication" 998: 228:in the early 1970s was the first to implement the 4308:Trammell, Brian; Kuehlewind, Mirja (April 2019). 4280:Farrell, Stephen; Tschofenig, Hannes (May 2014). 4279: 3862:, 2.3. Protecting Information and Authentication. 3823: 3808: 2796: 2301:"Principles and lessons in packet communications" 1740:. Corresponding layers at each system are called 1050:Institute of Electrical and Electronics Engineers 1040:of relevance for communication protocols are the 822:of cases, keeping each design relatively simple. 647:receiver can be identified using an address pair 6661: 4363: 4090: 3760: 2529: 640:(MTU) are divided in pieces of appropriate size. 4392:Thomson, Martin; Pauly, Tommy (December 2021). 4210: 3459: 3392:Patterns of Enterprise Application Architecture 2899: 2897: 498:encoded in a machine-readable encoding such as 416:independent. The best-known frameworks are the 4364:Fairhurst, Gorry; Perkins, Colin (July 2021). 4123:. Internet Engineering Task Force abbr. IETF. 2932: 2930: 2920: 2918: 2037:strictly refers to port numbers, and the term 1099: 1042:International Organization for Standardization 506:, or in structured text-based formats such as 113:International Organization for Standardization 5686:Note: This template roughly follows the 2012 5662: 4570: 4452:. 2016 Applied Networking Research Workshop. 4040: 2206: 1701: 785:(CSP). Concurrency can also be modeled using 439:. Some of the best-known protocol suites are 4391: 4251: 4191: 4167: 4015: 4003: 3979: 3509: 3356: 3329: 3257: 2894: 2885: 2876: 245:, an early contribution to what will be the 5585:Global telecommunications regulation bodies 4516: 4479:IEEE Communications Surveys & Tutorials 4073:Design and Validation of Computer Protocols 2939: 2927: 2915: 2825:. IEEE Annals of the History of Computing. 2790: 2535: 2403: 2152: 2150: 833:. The first two cooperating protocols, the 725:links or from one sender at a time as on a 5669: 5655: 5621: 4577: 4563: 4145: 3314: 2697: 2166: 2164: 2162: 1708: 1694: 1031: 825:The communication protocols in use on the 707:Loss of information - timeouts and retries 373:polarized over the issue of which standard 4499: 4465: 4431: 4403: 4375: 4347: 4319: 4291: 4263: 4128: 4113: 3477: 3460:Brand, Daniel; Zafiropulo, Pitro (1983). 3221: 2298: 2248:"6.1 The Communications Subnet: BBN 1969" 2239: 2010:. The layering scheme from ISO is called 1952:(UDP) are the only practical choices for 170:in the United Kingdom, it was written by 3462:"On Communicating Finite-State Machines" 3423: 3371: 3317:Computer Networking: A Top-Down Approach 2654: 2611: 2550: 2179: 2147: 900: 875: 808: 427:At the time the Internet was developed, 305:, contributed to the development of the 134: 3299: 2760: 2614:IEEE Annals of the History of Computing 2462: 2409: 2268: 2159: 982: 952: 321:(SNA), Digital Equipment Corporation's 282:specification was written by Cerf with 85:. An alternate formulation states that 6662: 6379:Knowledge representation and reasoning 4584: 4335: 3991: 3874:, 2.5. Limiting Impact of Information. 3386: 3194:Ben-Ari 1982, in his preface, p. xiii. 3086:from the original on 30 September 2019 2435: 2136:from the original on 12 September 2012 1996: 1830: 1120: 924:called the operating system boundary. 201:and other graduate students including 6404:Philosophy of artificial intelligence 5650: 4558: 3203:Ben-Ari 1982, in his preface, p. xiv. 3047: 3020: 2993: 2864:from the original on 24 February 2021 2832:from the original on 17 November 2019 2778:from the original on 1 September 2022 2373: 1046:International Telecommunication Union 602: 5730:Energy consumption (Green computing) 5676: 5631: 4517:Moschovitis, Christos J. P. (1999). 4311:The Wire Image of a Network Protocol 4151:Principles of concurrent programming 3538:from the original on 1 February 2021 2746:. Trafford Publishing. p. 354. 2180:Naughton, John (24 September 2015). 896: 871: 297:standard which was presented to the 197:(NCP) for the ARPANET, developed by 87:protocols are to communication what 6409:Distributed artificial intelligence 5688:ACM Computing Classification System 4194:Principles of programming languages 3968:McQuistin, Perkins & Fayed 2016 3315:Kurose, James; Ross, Keith (2005). 2817: 2589:from the original on 6 January 2017 2560:IEEE Transactions on Communications 2468: 2410:Bennett, Richard (September 2009). 1096:) may not be respected in another. 291:International Network Working Group 13: 5921:Integrated development environment 4174:Communicating sequential processes 3357:Lascano, J. E.; Clyde, S. (2016). 2797:Andrew L. Russell (30 July 2013). 2605: 2492: 2391:from the original on 7 August 2022 2262: 2245: 2213:Annals of the History of Computing 1730:Open Systems Interconnection model 940: 927: 783:communicating sequential processes 764: 649:(sender address, receiver address) 412:the protocol software may be made 57:. Protocols may be implemented by 37:. The protocol defines the rules, 14: 6691: 6389:Automated planning and scheduling 5926:Software configuration management 4538: 4283:Pervasive Monitoring Is an Attack 4215:(2nd ed.). Chartwell Bratt. 3050:"Binary Representation Protocols" 3023:"Binary Representation Protocols" 2362: 1936:Ossification is a major issue in 1058:public switched telephone network 1005:Binary Synchronous Communications 702:connection-oriented communication 643:Address formats for data exchange 127:(PSTN). As the PSTN and Internet 125:public switched telephone network 6643: 6633: 6624: 6623: 5630: 5620: 5611: 5610: 5599: 5220:Free-space optical communication 4235:Structured computer organization 4048:(2nd ed.). Addison-Wesley. 4021: 3838:, 2.1. Intentional Distribution. 2975:from the original on 31 May 2022 2475:. Edward Elgar. pp. 51–55. 2029:refers to protocols utilizing a 690:Detection of transmission errors 6634: 6037:Computational complexity theory 4339:Transport Protocol Path Signals 4336:Hardie, Ted, ed. (April 2019). 4213:Communication network protocols 4098:(4th ed.). Prentice Hall. 4034: 3898:, 2.6. Minimum Set of Entities. 3700: 3684: 3675: 3659: 3640: 3631: 3622: 3613: 3604: 3595: 3586: 3577: 3568: 3559: 3550: 3524: 3515: 3494: 3453: 3444: 3417: 3408: 3380: 3365: 3350: 3323: 3308: 3293: 3284: 3275: 3266: 3248: 3228:, NPTEL courses, archived from 3215: 3206: 3197: 3188: 3179: 3170: 3161: 3152: 3143: 3134: 3125: 3116: 3107: 3098: 3068: 3048:Kirch, Olaf (16 January 2002). 3041: 3021:Kirch, Olaf (16 January 2002). 3014: 2994:Kirch, Olaf (16 January 2002). 2987: 2957: 2948: 2906: 2844: 2811: 2799:"OSI: The Internet That Wasn't" 2734: 2691: 2648: 2544: 2445:. MIT Press. pp. 124–127. 2429: 2381:"NCP – Network Control Program" 2356: 2335: 2069: 1903: 1054:Internet Engineering Task Force 999:The need for protocol standards 115:(ISO) handles other types. The 105:Internet Engineering Task Force 5828:Network performance evaluation 3797:Trammell & Kuehlewind 2019 3785:Trammell & Kuehlewind 2019 3773:Trammell & Kuehlewind 2019 3746:Trammell & Kuehlewind 2019 3734:Trammell & Kuehlewind 2019 3719:Trammell & Kuehlewind 2019 2292: 2207:Cambell-Kelly, Martin (1987). 2200: 2173: 2116: 2090: 624:Data formats for data exchange 527:improved bandwidth utilization 123:protocols and formats for the 1: 6192:Multimedia information system 6177:Geographic information system 6167:Enterprise information system 5763:Computer systems organization 3824:Farrell & Tschofenig 2014 3809:Farrell & Tschofenig 2014 2275:. Stripe Press. p. 286. 2269:Waldrop, M. Mitchell (2018). 2183:A Brief History of the Future 2083: 1982:connection-oriented protocols 1975: 1946:Transmission Control Protocol 1852: 835:Transmission Control Protocol 718:Direction of information flow 542:Simple Mail Transfer Protocol 477: 247:Transmission Control Protocol 6551:Computational social science 6139:Theoretical computer science 5959:Software development process 5735:Electronic design automation 5720:Very Large Scale Integration 5606:Telecommunication portal 5387:Telecommunications equipment 4545:Javvin's Protocol Dictionary 4018:, 3.5. Restoring Active Use. 3886:, 2.4. Minimize Information. 3761:Fairhurst & Perkins 2021 3438:10.1016/0376-5075(78)90015-6 3225:Digital Circuits and Systems 2700:IEEE Communications Magazine 2657:IEEE Communications Magazine 1917:is the loss of flexibility, 1111:draft international standard 959:Abstract Syntax Notation One 319:Systems Network Architecture 272:Transmission Control Program 168:National Physical Laboratory 65:, or a combination of both. 7: 6374:Natural language processing 6162:Information storage systems 5123:Alexander Stepanovich Popov 2807:. Vol. 50, no. 8. 2551:Cerf, V.; Kahn, R. (1974). 2044: 1897:Internet Architecture Board 1100:The standardization process 1064:communication systems. For 1007:(BSC) protocol invented by 804: 694:somehow for retransmission. 546:Hypertext Transfer Protocol 544:), early versions of HTTP ( 293:agreed on a connectionless 267:(PUP) for internetworking. 174:and Keith Bartlett for the 10: 6696: 6290:Human–computer interaction 6260:Intrusion detection system 6172:Social information systems 6157:Database management system 4827:Telecommunications history 4492:10.1109/COMST.2016.2626780 3076:"Welcome To UML Web Site!" 2768:"TCP/IP Internet Protocol" 2500:"The internet's fifth man" 2051:Lists of network protocols 1907: 1856: 967:augmented Backus–Naur form 866:Asynchronous Transfer Mode 490:represents its content in 378: 150:The first use of the term 143: 139: 6619: 6556:Computational engineering 6531:Computational mathematics 6508: 6455: 6417: 6364: 6326: 6288: 6230: 6147: 6093: 6055: 6007: 5944: 5877: 5841: 5798: 5762: 5695: 5684: 5594: 5536: 5473: 5435:Public Switched Telephone 5395: 5359: 5316: 5257: 5247:telecommunication circuit 5208:Fiber-optic communication 5191: 4953:Francis Blake (telephone) 4900: 4748:Optical telecommunication 4592: 2712:10.1109/MCOM.2009.5350364 2669:10.1109/MCOM.2010.5621965 2572:10.1109/TCOM.1974.1092259 2102:Starkey Laboratories Inc. 1925:. This is largely due to 1080:closely with each other. 1074:World Wide Web Consortium 638:maximum transmission unit 571:utilizes all values of a 562: 6670:Communications protocols 6566:Computational healthcare 6561:Differentiable computing 6480:Graphics processing unit 5906:Domain-specific language 5775:Computational complexity 5346:Orbital angular-momentum 4783:Satellite communications 4622:Communications satellite 4211:Brian W Marsden (1986). 4016:Thomson & Pauly 2021 4004:Thomson & Pauly 2021 3980:Thomson & Pauly 2021 3956:Papastergiou et al. 2017 3944:Papastergiou et al. 2017 3932:Papastergiou et al. 2017 3920:Papastergiou et al. 2017 3510:Bryant & Morrow 2009 2469:Kim, Byung-Keun (2005). 2369:. High Definition Books. 2363:BOOKS, HIGH DEFINITION. 2062: 1986:connectionless protocols 1072:standards are used. The 1060:(PSTN), as well as many 947:software design patterns 469: 344:by 1989, as outlined in 6541:Computational chemistry 6475:Photograph manipulation 6366:Artificial intelligence 6182:Decision support system 5225:Molecular communication 5048:Gardiner Greene Hubbard 4877:Undersea telegraph line 4612:Cable protection system 4458:10.1145/2959424.2959443 2352:(BBN). Report No. 1822. 2350:Bolt Beranek and Newman 2317:10.1109/PROC.1978.11143 2305:Proceedings of the IEEE 2225:10.1109/MAHC.1987.10023 2130:Encyclopædia Britannica 1038:standards organizations 1032:Standards organizations 831:Internet Protocol Suite 820:combinatorial explosion 342:Internet protocol suite 195:Network Control Program 158:Under the direction of 33:via any variation of a 6606:Educational technology 6437:Reinforcement learning 6187:Process control system 6085:Computational geometry 6075:Algorithmic efficiency 6070:Analysis of algorithms 5725:Systems on Chip (SoCs) 5367:Communication protocol 5153:Charles Sumner Tainter 4968:Walter Houser Brattain 4913:Edwin Howard Armstrong 4721:Information revolution 2996:"Text Based Protocols" 2442:Inventing the Internet 2299:Kleinrock, L. (1978). 1950:User Datagram Protocol 1831:TCP/IP layering scheme 1720:A lesson learned from 1115:international standard 993:standards organization 907: 881: 814: 778:concurrent programming 773:conceptual framework. 616:of the communication. 538:File Transfer Protocol 336:This was installed on 241:service while using a 55:error recovery methods 23:communication protocol 6576:Electronic publishing 6546:Computational biology 6536:Computational physics 6432:Unsupervised learning 6346:Distributed computing 6222:Information retrieval 6129:Mathematical analysis 6119:Mathematical software 6009:Theory of computation 5974:Software construction 5964:Requirements analysis 5842:Software organization 5770:Computer architecture 5740:Hardware acceleration 5705:Printed circuit board 5341:Polarization-division 5073:Narinder Singh Kapany 5038:Erna Schneider Hoover 4958:Jagadish Chandra Bose 4938:Alexander Graham Bell 4669:online video platform 4192:R.D. Tennent (1981). 3479:10.1145/322374.322380 3372:Daigneau, R. (2011). 2969:www.sciencedirect.com 1915:Protocol ossification 1910:protocol ossification 1802:also responsible for 1772:and data encryption). 904: 879: 812: 787:finite state machines 492:human-readable format 327:Xerox Network Systems 315:proprietary protocols 265:PARC Universal Packet 259:outlined the idea of 224:network, designed by 144:Further information: 135:Communicating systems 27:communications system 6336:Concurrent computing 6308:Ubiquitous computing 6280:Application security 6275:Information security 6104:Discrete mathematics 6080:Randomized algorithm 6032:Computability theory 6017:Model of computation 5989:Software maintenance 5984:Software engineering 5946:Software development 5896:Programming language 5891:Programming paradigm 5808:Network architecture 5183:Vladimir K. Zworykin 5143:Almon Brown Strowger 5113:Charles Grafton Page 4768:Prepaid mobile phone 4696:Electrical telegraph 2506:. 30 November 2013. 1931:end-to-end principle 1921:and evolvability of 1738:service access point 1726:structured protocols 1113:, and ultimately an 983:Protocol development 977:Finite-state machine 953:Formal specification 731:media access control 429:abstraction layering 230:end-to-end principle 211:application software 79:programming language 6611:Document management 6601:Operations research 6526:Enterprise software 6442:Multi-task learning 6427:Supervised learning 6149:Information systems 5979:Software deployment 5936:Software repository 5790:Real-time computing 5133:Johann Philipp Reis 4892:Wireless revolution 4854:The Telephone Cases 4711:Hydraulic telegraph 4231:Andrew S. Tanenbaum 3232:on 27 December 2009 2818:Russell, Andrew L. 2626:10.1109/MAHC.2011.9 1954:transport protocols 1829:In contrast to the 1121:OSI standardization 1090:monotone decreasing 918:Program translation 770:Systems engineering 729:. This is known as 488:plain text protocol 484:text-based protocol 464:transport protocols 406:transmission medium 309:standard, based on 243:best-effort service 6394:Search methodology 6341:Parallel computing 6298:Interaction design 6207:Computing platform 6134:Numerical analysis 6124:Information theory 5916:Software framework 5879:Software notations 5818:Network components 5715:Integrated circuit 5331:Frequency-division 5308:Telephone exchange 5178:Charles Wheatstone 5108:Jun-ichi Nishizawa 5083:Innocenzo Manzetti 5018:Reginald Fessenden 4753:Optical telegraphy 4586:Telecommunications 4068:Gerard J. Holzmann 3946:, p. 620-621. 3910:, 3. Further Work. 3466:Journal of the ACM 1990:tunneling protocol 1804:network congestion 1768:presentation layer 1254:Presentation layer 1092:to prevent stable 1066:marine electronics 1017:de facto standards 988:interoperability. 908: 882: 815: 603:Basic requirements 121:telecommunications 91:are to computation 75:technical standard 6680:Network protocols 6675:Data transmission 6657: 6656: 6586:Electronic voting 6516:Quantum Computing 6509:Applied computing 6495:Image compression 6265:Hardware security 6255:Security services 6212:Digital marketing 5999:Open-source model 5911:Modeling language 5823:Network scheduler 5644: 5643: 5382:Store and forward 5377:Data transmission 5291:Network switching 5242:Transmission line 5088:Guglielmo Marconi 5053:Internet pioneers 4918:Mohamed M. Atalla 4887:Whistled language 4530:978-1-57607-118-2 4076:. Prentice Hall. 3908:Arkko et al. 2023 3896:Arkko et al. 2023 3884:Arkko et al. 2023 3872:Arkko et al. 2023 3860:Arkko et al. 2023 3848:Arkko et al. 2023 3836:Arkko et al. 2023 3763:, 7. Conclusions. 3426:Computer Networks 2753:978-1-4669-3935-6 2452:978-0-262-51115-5 2311:(11): 1320–1329. 2282:978-1-953953-36-0 2272:The Dream Machine 2246:Pelkey, James L. 2193:978-1-4746-0277-8 2004:Internet layering 1923:network protocols 1880:of the protocol. 1754:Application layer 1718: 1717: 1146:Application layer 897:Software layering 890:data flow diagram 872:Protocol layering 839:Internet Protocol 658:addressing scheme 215:protocol layering 172:Roger Scantlebury 35:physical quantity 6687: 6647: 6646: 6637: 6636: 6627: 6626: 6447:Cross-validation 6419:Machine learning 6303:Social computing 6270:Network security 6065:Algorithm design 5994:Programming team 5954:Control variable 5931:Software library 5869:Software quality 5864:Operating system 5813:Network protocol 5678:Computer science 5671: 5664: 5657: 5648: 5647: 5634: 5633: 5624: 5623: 5614: 5613: 5604: 5603: 5602: 5475:Notable networks 5465:Wireless network 5405:Cellular network 5397:Types of network 5372:Computer network 5259:Network topology 5173:Thomas A. Watson 5028:Oliver Heaviside 5013:Philo Farnsworth 4988:Daniel Davis Jr. 4963:Charles Bourseul 4923:John Logie Baird 4632:Data compression 4627:Computer network 4579: 4572: 4565: 4556: 4555: 4534: 4513: 4503: 4471: 4469: 4444: 4435: 4433:10.17487/RFC9419 4416: 4407: 4405:10.17487/RFC9170 4388: 4379: 4377:10.17487/RFC9065 4360: 4351: 4349:10.17487/RFC8558 4332: 4323: 4321:10.17487/RFC8546 4304: 4295: 4293:10.17487/RFC7258 4276: 4267: 4265:10.17487/RFC5704 4248: 4226: 4207: 4188: 4164: 4141: 4132: 4130:10.17487/RFC1122 4109: 4092:Douglas E. Comer 4087: 4062:available online 4059: 4028: 4025: 4019: 4013: 4007: 4006:, 3. Active Use. 4001: 3995: 3989: 3983: 3977: 3971: 3965: 3959: 3958:, p. 623-4. 3953: 3947: 3941: 3935: 3929: 3923: 3917: 3911: 3905: 3899: 3893: 3887: 3881: 3875: 3869: 3863: 3857: 3851: 3845: 3839: 3833: 3827: 3821: 3812: 3806: 3800: 3794: 3788: 3782: 3776: 3770: 3764: 3758: 3749: 3743: 3737: 3731: 3722: 3716: 3707: 3704: 3698: 3697: 3688: 3682: 3679: 3673: 3672: 3663: 3657: 3656: 3644: 3638: 3635: 3629: 3626: 3620: 3617: 3611: 3608: 3602: 3599: 3593: 3590: 3584: 3581: 3575: 3572: 3566: 3563: 3557: 3554: 3548: 3547: 3545: 3543: 3528: 3522: 3519: 3513: 3507: 3501: 3498: 3492: 3491: 3481: 3457: 3451: 3448: 3442: 3441: 3432:(4–5): 361–372. 3421: 3415: 3412: 3406: 3405: 3384: 3378: 3377: 3369: 3363: 3362: 3354: 3348: 3347: 3345: 3343: 3338:on 18 March 2017 3334:. Archived from 3327: 3321: 3320: 3312: 3306: 3305: 3297: 3291: 3288: 3282: 3279: 3273: 3270: 3264: 3261: 3255: 3252: 3246: 3243: 3234: 3233: 3219: 3213: 3210: 3204: 3201: 3195: 3192: 3186: 3183: 3177: 3174: 3168: 3165: 3159: 3156: 3150: 3147: 3141: 3138: 3132: 3129: 3123: 3120: 3114: 3111: 3105: 3102: 3096: 3095: 3093: 3091: 3072: 3066: 3065: 3063: 3061: 3052:. Archived from 3045: 3039: 3038: 3036: 3034: 3025:. Archived from 3018: 3012: 3011: 3009: 3007: 2998:. Archived from 2991: 2985: 2984: 2982: 2980: 2961: 2955: 2952: 2946: 2943: 2937: 2934: 2925: 2922: 2913: 2910: 2904: 2901: 2892: 2889: 2883: 2880: 2874: 2873: 2871: 2869: 2863: 2856: 2852:"Standards Wars" 2848: 2842: 2841: 2839: 2837: 2831: 2824: 2815: 2809: 2808: 2794: 2788: 2787: 2785: 2783: 2764: 2758: 2757: 2738: 2732: 2731: 2695: 2689: 2688: 2652: 2646: 2645: 2609: 2603: 2602: 2596: 2594: 2588: 2557: 2548: 2542: 2536:Moschovitis 1999 2533: 2527: 2526: 2520: 2518: 2496: 2490: 2489: 2466: 2460: 2459: 2433: 2427: 2426: 2424: 2422: 2416: 2407: 2401: 2400: 2398: 2396: 2377: 2371: 2370: 2360: 2354: 2353: 2347: 2339: 2333: 2332: 2296: 2290: 2289: 2266: 2260: 2259: 2243: 2237: 2236: 2219:(3/4): 221–247. 2204: 2198: 2197: 2177: 2171: 2168: 2157: 2154: 2145: 2144: 2143: 2141: 2120: 2114: 2113: 2112: 2108: 2094: 2077: 2073: 2056:Protocol Builder 1710: 1703: 1696: 1137: 1125: 1124: 1052:(IEEE), and the 744:Sequence control 697:Acknowledgements 508:Intel hex format 414:operating system 311:virtual circuits 164:packet switching 162:, who pioneered 6695: 6694: 6690: 6689: 6688: 6686: 6685: 6684: 6660: 6659: 6658: 6653: 6644: 6615: 6596:Word processing 6504: 6490:Virtual reality 6451: 6413: 6384:Computer vision 6360: 6356:Multiprocessing 6322: 6284: 6250:Security hacker 6226: 6202:Digital library 6143: 6094:Mathematics of 6089: 6051: 6027:Automata theory 6022:Formal language 6003: 5969:Software design 5940: 5873: 5859:Virtual machine 5837: 5833:Network service 5794: 5785:Embedded system 5758: 5691: 5680: 5675: 5645: 5640: 5600: 5598: 5590: 5532: 5469: 5391: 5355: 5312: 5261: 5253: 5194: 5187: 5093:Robert Metcalfe 4948:Tim Berners-Lee 4896: 4716:Information Age 4588: 4583: 4541: 4531: 4245: 4223: 4204: 4185: 4161: 4106: 4084: 4056: 4037: 4032: 4031: 4026: 4022: 4014: 4010: 4002: 3998: 3990: 3986: 3978: 3974: 3966: 3962: 3954: 3950: 3942: 3938: 3930: 3926: 3918: 3914: 3906: 3902: 3894: 3890: 3882: 3878: 3870: 3866: 3858: 3854: 3846: 3842: 3834: 3830: 3822: 3815: 3807: 3803: 3795: 3791: 3783: 3779: 3771: 3767: 3759: 3752: 3744: 3740: 3732: 3725: 3717: 3710: 3705: 3701: 3690: 3689: 3685: 3680: 3676: 3665: 3664: 3660: 3646: 3645: 3641: 3636: 3632: 3627: 3623: 3618: 3614: 3609: 3605: 3600: 3596: 3591: 3587: 3582: 3578: 3573: 3569: 3564: 3560: 3555: 3551: 3541: 3539: 3530: 3529: 3525: 3520: 3516: 3508: 3504: 3499: 3495: 3458: 3454: 3449: 3445: 3422: 3418: 3413: 3409: 3402: 3385: 3381: 3370: 3366: 3355: 3351: 3341: 3339: 3328: 3324: 3313: 3309: 3298: 3294: 3289: 3285: 3280: 3276: 3271: 3267: 3262: 3258: 3253: 3249: 3244: 3237: 3222:S. Srinivasan, 3220: 3216: 3211: 3207: 3202: 3198: 3193: 3189: 3184: 3180: 3175: 3171: 3166: 3162: 3157: 3153: 3148: 3144: 3139: 3135: 3130: 3126: 3121: 3117: 3112: 3108: 3103: 3099: 3089: 3087: 3074: 3073: 3069: 3059: 3057: 3056:on 5 March 2006 3046: 3042: 3032: 3030: 3019: 3015: 3005: 3003: 2992: 2988: 2978: 2976: 2963: 2962: 2958: 2953: 2949: 2944: 2940: 2935: 2928: 2923: 2916: 2911: 2907: 2902: 2895: 2890: 2886: 2881: 2877: 2867: 2865: 2861: 2854: 2850: 2849: 2845: 2835: 2833: 2829: 2822: 2816: 2812: 2795: 2791: 2781: 2779: 2772:Living Internet 2766: 2765: 2761: 2754: 2740: 2739: 2735: 2696: 2692: 2653: 2649: 2610: 2606: 2592: 2590: 2586: 2555: 2549: 2545: 2534: 2530: 2516: 2514: 2498: 2497: 2493: 2483: 2467: 2463: 2453: 2434: 2430: 2420: 2418: 2414: 2408: 2404: 2394: 2392: 2385:Living Internet 2379: 2378: 2374: 2361: 2357: 2345: 2341: 2340: 2336: 2297: 2293: 2283: 2267: 2263: 2244: 2240: 2205: 2201: 2194: 2178: 2174: 2169: 2160: 2155: 2148: 2139: 2137: 2122: 2121: 2117: 2110: 2095: 2091: 2086: 2081: 2080: 2074: 2070: 2065: 2047: 2008:TCP/IP layering 1998:layering scheme 1978: 1912: 1906: 1861: 1855: 1812:data link layer 1788:transport layer 1714: 1685: 1684: 1590: 1579: 1578: 1475: 1473:Data link layer 1464: 1463: 1397: 1386: 1385: 1351: 1349:Transport layer 1340: 1339: 1302: 1291: 1290: 1256: 1245: 1244: 1148: 1132: 1131: 1123: 1102: 1034: 1001: 985: 955: 943: 941:Design patterns 930: 928:Strict layering 899: 874: 868:(ATM) network. 807: 767: 765:Protocol design 684:internetworking 669:address mapping 663:Address mapping 605: 569:binary protocol 565: 550:finger protocol 480: 472: 394:data structures 381: 239:virtual circuit 232:, and make the 148: 142: 137: 47:synchronization 17: 12: 11: 5: 6693: 6683: 6682: 6677: 6672: 6655: 6654: 6652: 6651: 6641: 6631: 6620: 6617: 6616: 6614: 6613: 6608: 6603: 6598: 6593: 6588: 6583: 6578: 6573: 6568: 6563: 6558: 6553: 6548: 6543: 6538: 6533: 6528: 6523: 6518: 6512: 6510: 6506: 6505: 6503: 6502: 6500:Solid modeling 6497: 6492: 6487: 6482: 6477: 6472: 6467: 6461: 6459: 6453: 6452: 6450: 6449: 6444: 6439: 6434: 6429: 6423: 6421: 6415: 6414: 6412: 6411: 6406: 6401: 6399:Control method 6396: 6391: 6386: 6381: 6376: 6370: 6368: 6362: 6361: 6359: 6358: 6353: 6351:Multithreading 6348: 6343: 6338: 6332: 6330: 6324: 6323: 6321: 6320: 6315: 6310: 6305: 6300: 6294: 6292: 6286: 6285: 6283: 6282: 6277: 6272: 6267: 6262: 6257: 6252: 6247: 6245:Formal methods 6242: 6236: 6234: 6228: 6227: 6225: 6224: 6219: 6217:World Wide Web 6214: 6209: 6204: 6199: 6194: 6189: 6184: 6179: 6174: 6169: 6164: 6159: 6153: 6151: 6145: 6144: 6142: 6141: 6136: 6131: 6126: 6121: 6116: 6111: 6106: 6100: 6098: 6091: 6090: 6088: 6087: 6082: 6077: 6072: 6067: 6061: 6059: 6053: 6052: 6050: 6049: 6044: 6039: 6034: 6029: 6024: 6019: 6013: 6011: 6005: 6004: 6002: 6001: 5996: 5991: 5986: 5981: 5976: 5971: 5966: 5961: 5956: 5950: 5948: 5942: 5941: 5939: 5938: 5933: 5928: 5923: 5918: 5913: 5908: 5903: 5898: 5893: 5887: 5885: 5875: 5874: 5872: 5871: 5866: 5861: 5856: 5851: 5845: 5843: 5839: 5838: 5836: 5835: 5830: 5825: 5820: 5815: 5810: 5804: 5802: 5796: 5795: 5793: 5792: 5787: 5782: 5777: 5772: 5766: 5764: 5760: 5759: 5757: 5756: 5747: 5742: 5737: 5732: 5727: 5722: 5717: 5712: 5707: 5701: 5699: 5693: 5692: 5685: 5682: 5681: 5674: 5673: 5666: 5659: 5651: 5642: 5641: 5639: 5638: 5628: 5618: 5608: 5595: 5592: 5591: 5589: 5588: 5581: 5576: 5571: 5566: 5561: 5560: 5559: 5554: 5546: 5540: 5538: 5534: 5533: 5531: 5530: 5525: 5520: 5515: 5510: 5505: 5500: 5495: 5490: 5485: 5479: 5477: 5471: 5470: 5468: 5467: 5462: 5457: 5452: 5447: 5442: 5437: 5432: 5427: 5422: 5417: 5412: 5407: 5401: 5399: 5393: 5392: 5390: 5389: 5384: 5379: 5374: 5369: 5363: 5361: 5357: 5356: 5354: 5353: 5348: 5343: 5338: 5333: 5328: 5326:Space-division 5322: 5320: 5314: 5313: 5311: 5310: 5305: 5304: 5303: 5298: 5288: 5287: 5286: 5276: 5271: 5265: 5263: 5255: 5254: 5252: 5251: 5250: 5249: 5239: 5238: 5237: 5227: 5222: 5217: 5216: 5215: 5205: 5199: 5197: 5189: 5188: 5186: 5185: 5180: 5175: 5170: 5165: 5163:Camille Tissot 5160: 5155: 5150: 5145: 5140: 5138:Claude Shannon 5135: 5130: 5128:Tivadar Puskás 5125: 5120: 5115: 5110: 5105: 5100: 5098:Antonio Meucci 5095: 5090: 5085: 5080: 5075: 5070: 5068:Charles K. Kao 5065: 5060: 5055: 5050: 5045: 5043:Harold Hopkins 5040: 5035: 5030: 5025: 5020: 5015: 5010: 5005: 5000: 4995: 4990: 4985: 4980: 4975: 4970: 4965: 4960: 4955: 4950: 4945: 4943:Emile Berliner 4940: 4935: 4930: 4925: 4920: 4915: 4910: 4904: 4902: 4898: 4897: 4895: 4894: 4889: 4884: 4882:Videotelephony 4879: 4874: 4873: 4872: 4867: 4857: 4850: 4845: 4839: 4834: 4829: 4824: 4819: 4818: 4817: 4812: 4807: 4797: 4796: 4795: 4785: 4780: 4778:Radiotelephone 4775: 4770: 4765: 4760: 4755: 4750: 4745: 4744: 4743: 4733: 4728: 4723: 4718: 4713: 4708: 4703: 4698: 4693: 4688: 4683: 4682: 4681: 4676: 4671: 4666: 4664:Internet video 4656: 4655: 4654: 4649: 4644: 4639: 4629: 4624: 4619: 4614: 4609: 4604: 4598: 4596: 4590: 4589: 4582: 4581: 4574: 4567: 4559: 4553: 4552: 4547: 4540: 4539:External links 4537: 4536: 4535: 4529: 4514: 4472: 4445: 4417: 4389: 4361: 4333: 4305: 4277: 4249: 4243: 4227: 4221: 4208: 4202: 4189: 4183: 4165: 4159: 4143: 4117:, ed. (1989). 4111: 4104: 4088: 4082: 4064: 4054: 4036: 4033: 4030: 4029: 4020: 4008: 3996: 3994:, p. 7-8. 3984: 3972: 3960: 3948: 3936: 3934:, p. 620. 3924: 3922:, p. 619. 3912: 3900: 3888: 3876: 3864: 3852: 3840: 3828: 3813: 3801: 3799:, p. 7-8. 3789: 3777: 3765: 3750: 3738: 3723: 3708: 3699: 3683: 3674: 3658: 3639: 3630: 3621: 3612: 3603: 3594: 3585: 3576: 3567: 3558: 3549: 3523: 3514: 3502: 3493: 3452: 3443: 3416: 3407: 3400: 3379: 3364: 3349: 3322: 3307: 3292: 3283: 3274: 3265: 3256: 3247: 3235: 3214: 3205: 3196: 3187: 3178: 3169: 3160: 3151: 3142: 3133: 3124: 3115: 3106: 3097: 3067: 3040: 3029:on 30 May 2010 3013: 3002:on 30 May 2010 2986: 2956: 2947: 2938: 2926: 2914: 2905: 2893: 2884: 2875: 2843: 2810: 2789: 2759: 2752: 2733: 2690: 2647: 2604: 2566:(5): 637–648. 2543: 2528: 2491: 2481: 2461: 2451: 2428: 2402: 2372: 2355: 2334: 2291: 2281: 2261: 2238: 2199: 2192: 2172: 2158: 2146: 2115: 2088: 2087: 2085: 2082: 2079: 2078: 2067: 2066: 2064: 2061: 2060: 2059: 2053: 2046: 2043: 1977: 1974: 1908:Main article: 1905: 1902: 1857:Main article: 1854: 1851: 1827: 1826: 1822:physical layer 1817: 1807: 1793: 1783: 1773: 1763: 1760:data integrity 1716: 1715: 1713: 1712: 1705: 1698: 1690: 1687: 1686: 1683: 1682: 1677: 1672: 1670:ITU-T G.hn PHY 1667: 1662: 1657: 1652: 1647: 1642: 1637: 1632: 1627: 1622: 1617: 1612: 1607: 1605:ITU-T V-Series 1602: 1597: 1591: 1588:Physical layer 1585: 1584: 1581: 1580: 1577: 1576: 1571: 1566: 1557: 1552: 1550:ITU-T G.hn DLL 1547: 1542: 1537: 1532: 1527: 1522: 1517: 1512: 1507: 1502: 1497: 1492: 1487: 1482: 1476: 1470: 1469: 1466: 1465: 1462: 1461: 1456: 1451: 1446: 1441: 1436: 1431: 1426: 1416: 1415: 1414: 1409: 1398: 1392: 1391: 1388: 1387: 1384: 1383: 1378: 1373: 1368: 1363: 1358: 1352: 1346: 1345: 1342: 1341: 1338: 1337: 1334: 1329: 1324: 1319: 1314: 1309: 1303: 1297: 1296: 1293: 1292: 1289: 1288: 1283: 1278: 1273: 1268: 1263: 1257: 1251: 1250: 1247: 1246: 1243: 1242: 1235: 1230: 1225: 1220: 1215: 1210: 1205: 1200: 1195: 1190: 1180: 1175: 1170: 1165: 1160: 1155: 1149: 1143: 1142: 1139: 1138: 1122: 1119: 1107:draft proposal 1101: 1098: 1033: 1030: 1000: 997: 984: 981: 965:standard) and 954: 951: 942: 939: 929: 926: 898: 895: 873: 870: 854:connectionless 837:(TCP) and the 806: 803: 795:Moore machines 766: 763: 762: 761: 758: 755: 752: 749: 745: 742: 719: 716: 708: 705: 698: 695: 691: 688: 675: 672: 664: 661: 644: 641: 625: 604: 601: 564: 561: 479: 476: 471: 468: 437:protocol suite 380: 377: 317:such as IBM's 255:and others at 141: 138: 136: 133: 98:protocol stack 15: 9: 6: 4: 3: 2: 6692: 6681: 6678: 6676: 6673: 6671: 6668: 6667: 6665: 6650: 6642: 6640: 6632: 6630: 6622: 6621: 6618: 6612: 6609: 6607: 6604: 6602: 6599: 6597: 6594: 6592: 6589: 6587: 6584: 6582: 6579: 6577: 6574: 6572: 6569: 6567: 6564: 6562: 6559: 6557: 6554: 6552: 6549: 6547: 6544: 6542: 6539: 6537: 6534: 6532: 6529: 6527: 6524: 6522: 6519: 6517: 6514: 6513: 6511: 6507: 6501: 6498: 6496: 6493: 6491: 6488: 6486: 6485:Mixed reality 6483: 6481: 6478: 6476: 6473: 6471: 6468: 6466: 6463: 6462: 6460: 6458: 6454: 6448: 6445: 6443: 6440: 6438: 6435: 6433: 6430: 6428: 6425: 6424: 6422: 6420: 6416: 6410: 6407: 6405: 6402: 6400: 6397: 6395: 6392: 6390: 6387: 6385: 6382: 6380: 6377: 6375: 6372: 6371: 6369: 6367: 6363: 6357: 6354: 6352: 6349: 6347: 6344: 6342: 6339: 6337: 6334: 6333: 6331: 6329: 6325: 6319: 6318:Accessibility 6316: 6314: 6313:Visualization 6311: 6309: 6306: 6304: 6301: 6299: 6296: 6295: 6293: 6291: 6287: 6281: 6278: 6276: 6273: 6271: 6268: 6266: 6263: 6261: 6258: 6256: 6253: 6251: 6248: 6246: 6243: 6241: 6238: 6237: 6235: 6233: 6229: 6223: 6220: 6218: 6215: 6213: 6210: 6208: 6205: 6203: 6200: 6198: 6195: 6193: 6190: 6188: 6185: 6183: 6180: 6178: 6175: 6173: 6170: 6168: 6165: 6163: 6160: 6158: 6155: 6154: 6152: 6150: 6146: 6140: 6137: 6135: 6132: 6130: 6127: 6125: 6122: 6120: 6117: 6115: 6112: 6110: 6107: 6105: 6102: 6101: 6099: 6097: 6092: 6086: 6083: 6081: 6078: 6076: 6073: 6071: 6068: 6066: 6063: 6062: 6060: 6058: 6054: 6048: 6045: 6043: 6040: 6038: 6035: 6033: 6030: 6028: 6025: 6023: 6020: 6018: 6015: 6014: 6012: 6010: 6006: 6000: 5997: 5995: 5992: 5990: 5987: 5985: 5982: 5980: 5977: 5975: 5972: 5970: 5967: 5965: 5962: 5960: 5957: 5955: 5952: 5951: 5949: 5947: 5943: 5937: 5934: 5932: 5929: 5927: 5924: 5922: 5919: 5917: 5914: 5912: 5909: 5907: 5904: 5902: 5899: 5897: 5894: 5892: 5889: 5888: 5886: 5884: 5880: 5876: 5870: 5867: 5865: 5862: 5860: 5857: 5855: 5852: 5850: 5847: 5846: 5844: 5840: 5834: 5831: 5829: 5826: 5824: 5821: 5819: 5816: 5814: 5811: 5809: 5806: 5805: 5803: 5801: 5797: 5791: 5788: 5786: 5783: 5781: 5780:Dependability 5778: 5776: 5773: 5771: 5768: 5767: 5765: 5761: 5755: 5751: 5748: 5746: 5743: 5741: 5738: 5736: 5733: 5731: 5728: 5726: 5723: 5721: 5718: 5716: 5713: 5711: 5708: 5706: 5703: 5702: 5700: 5698: 5694: 5689: 5683: 5679: 5672: 5667: 5665: 5660: 5658: 5653: 5652: 5649: 5637: 5629: 5627: 5619: 5617: 5609: 5607: 5597: 5596: 5593: 5586: 5582: 5580: 5577: 5575: 5572: 5570: 5567: 5565: 5562: 5558: 5555: 5553: 5550: 5549: 5547: 5545: 5542: 5541: 5539: 5535: 5529: 5526: 5524: 5521: 5519: 5516: 5514: 5511: 5509: 5506: 5504: 5501: 5499: 5496: 5494: 5491: 5489: 5486: 5484: 5481: 5480: 5478: 5476: 5472: 5466: 5463: 5461: 5458: 5456: 5453: 5451: 5448: 5446: 5443: 5441: 5438: 5436: 5433: 5431: 5428: 5426: 5423: 5421: 5418: 5416: 5413: 5411: 5408: 5406: 5403: 5402: 5400: 5398: 5394: 5388: 5385: 5383: 5380: 5378: 5375: 5373: 5370: 5368: 5365: 5364: 5362: 5358: 5352: 5351:Code-division 5349: 5347: 5344: 5342: 5339: 5337: 5336:Time-division 5334: 5332: 5329: 5327: 5324: 5323: 5321: 5319: 5315: 5309: 5306: 5302: 5299: 5297: 5294: 5293: 5292: 5289: 5285: 5282: 5281: 5280: 5277: 5275: 5272: 5270: 5267: 5266: 5264: 5262:and switching 5260: 5256: 5248: 5245: 5244: 5243: 5240: 5236: 5233: 5232: 5231: 5228: 5226: 5223: 5221: 5218: 5214: 5213:optical fiber 5211: 5210: 5209: 5206: 5204: 5203:Coaxial cable 5201: 5200: 5198: 5196: 5190: 5184: 5181: 5179: 5176: 5174: 5171: 5169: 5166: 5164: 5161: 5159: 5156: 5154: 5151: 5149: 5146: 5144: 5141: 5139: 5136: 5134: 5131: 5129: 5126: 5124: 5121: 5119: 5118:Radia Perlman 5116: 5114: 5111: 5109: 5106: 5104: 5101: 5099: 5096: 5094: 5091: 5089: 5086: 5084: 5081: 5079: 5076: 5074: 5071: 5069: 5066: 5064: 5061: 5059: 5056: 5054: 5051: 5049: 5046: 5044: 5041: 5039: 5036: 5034: 5031: 5029: 5026: 5024: 5021: 5019: 5016: 5014: 5011: 5009: 5008:Lee de Forest 5006: 5004: 5003:Thomas Edison 5001: 4999: 4996: 4994: 4993:Donald Davies 4991: 4989: 4986: 4984: 4981: 4979: 4978:Claude Chappe 4976: 4974: 4971: 4969: 4966: 4964: 4961: 4959: 4956: 4954: 4951: 4949: 4946: 4944: 4941: 4939: 4936: 4934: 4931: 4929: 4926: 4924: 4921: 4919: 4916: 4914: 4911: 4909: 4906: 4905: 4903: 4899: 4893: 4890: 4888: 4885: 4883: 4880: 4878: 4875: 4871: 4868: 4866: 4863: 4862: 4861: 4858: 4856: 4855: 4851: 4849: 4846: 4843: 4840: 4838: 4835: 4833: 4830: 4828: 4825: 4823: 4822:Smoke signals 4820: 4816: 4813: 4811: 4808: 4806: 4803: 4802: 4801: 4800:Semiconductor 4798: 4794: 4791: 4790: 4789: 4786: 4784: 4781: 4779: 4776: 4774: 4771: 4769: 4766: 4764: 4761: 4759: 4756: 4754: 4751: 4749: 4746: 4742: 4739: 4738: 4737: 4734: 4732: 4729: 4727: 4724: 4722: 4719: 4717: 4714: 4712: 4709: 4707: 4704: 4702: 4699: 4697: 4694: 4692: 4689: 4687: 4684: 4680: 4677: 4675: 4672: 4670: 4667: 4665: 4662: 4661: 4660: 4659:Digital media 4657: 4653: 4650: 4648: 4645: 4643: 4640: 4638: 4635: 4634: 4633: 4630: 4628: 4625: 4623: 4620: 4618: 4615: 4613: 4610: 4608: 4605: 4603: 4600: 4599: 4597: 4595: 4591: 4587: 4580: 4575: 4573: 4568: 4566: 4561: 4560: 4557: 4551: 4548: 4546: 4543: 4542: 4532: 4526: 4522: 4521: 4515: 4511: 4507: 4502: 4497: 4493: 4489: 4485: 4481: 4480: 4473: 4468: 4463: 4459: 4455: 4451: 4446: 4442: 4439: 4434: 4429: 4425: 4424: 4418: 4414: 4411: 4406: 4401: 4397: 4396: 4390: 4386: 4383: 4378: 4373: 4369: 4368: 4362: 4358: 4355: 4350: 4345: 4341: 4340: 4334: 4330: 4327: 4322: 4317: 4313: 4312: 4306: 4302: 4299: 4294: 4289: 4285: 4284: 4278: 4274: 4271: 4266: 4261: 4257: 4256: 4250: 4246: 4244:0-13-854605-3 4240: 4236: 4232: 4228: 4224: 4222:0-86238-106-1 4218: 4214: 4209: 4205: 4203:0-13-709873-1 4199: 4195: 4190: 4186: 4184:0-13-153271-5 4180: 4176: 4175: 4170: 4166: 4162: 4160:0-13-701078-8 4156: 4152: 4148: 4144: 4139: 4136: 4131: 4126: 4122: 4121: 4116: 4112: 4107: 4105:0-13-018380-6 4101: 4097: 4093: 4089: 4085: 4083:0-13-539925-4 4079: 4075: 4074: 4069: 4065: 4063: 4057: 4055:0-201-63448-1 4051: 4047: 4043: 4042:Radia Perlman 4039: 4038: 4024: 4017: 4012: 4005: 4000: 3993: 3988: 3981: 3976: 3969: 3964: 3957: 3952: 3945: 3940: 3933: 3928: 3921: 3916: 3909: 3904: 3897: 3892: 3885: 3880: 3873: 3868: 3861: 3856: 3849: 3844: 3837: 3832: 3825: 3820: 3818: 3810: 3805: 3798: 3793: 3786: 3781: 3774: 3769: 3762: 3757: 3755: 3747: 3742: 3735: 3730: 3728: 3720: 3715: 3713: 3703: 3695: 3694: 3687: 3678: 3670: 3669: 3662: 3655: 3652:. p. 5. 3651: 3650: 3643: 3634: 3625: 3616: 3607: 3598: 3589: 3580: 3571: 3562: 3553: 3537: 3533: 3527: 3518: 3511: 3506: 3497: 3489: 3485: 3480: 3475: 3471: 3467: 3463: 3456: 3447: 3439: 3435: 3431: 3427: 3420: 3411: 3403: 3401:0-321-12742-0 3397: 3393: 3389: 3383: 3375: 3368: 3360: 3353: 3337: 3333: 3326: 3318: 3311: 3303: 3296: 3287: 3278: 3269: 3260: 3251: 3242: 3240: 3231: 3227: 3226: 3218: 3209: 3200: 3191: 3182: 3173: 3164: 3155: 3146: 3137: 3128: 3119: 3110: 3101: 3085: 3081: 3077: 3071: 3055: 3051: 3044: 3028: 3024: 3017: 3001: 2997: 2990: 2974: 2970: 2966: 2960: 2951: 2942: 2933: 2931: 2921: 2919: 2909: 2900: 2898: 2888: 2879: 2860: 2853: 2847: 2828: 2821: 2814: 2806: 2805: 2804:IEEE Spectrum 2800: 2793: 2777: 2773: 2769: 2763: 2755: 2749: 2745: 2744: 2737: 2729: 2725: 2721: 2717: 2713: 2709: 2706:(12): 26–31. 2705: 2701: 2694: 2686: 2682: 2678: 2674: 2670: 2666: 2663:(11): 40–46. 2662: 2658: 2651: 2643: 2639: 2635: 2631: 2627: 2623: 2619: 2615: 2608: 2601: 2585: 2581: 2577: 2573: 2569: 2565: 2561: 2554: 2547: 2541: 2537: 2532: 2525: 2513: 2509: 2505: 2504:The Economist 2501: 2495: 2488: 2484: 2478: 2474: 2473: 2465: 2458: 2454: 2448: 2444: 2443: 2438: 2437:Abbate, Janet 2432: 2413: 2406: 2390: 2386: 2382: 2376: 2368: 2367: 2359: 2351: 2344: 2338: 2331: 2326: 2322: 2318: 2314: 2310: 2306: 2302: 2295: 2288: 2284: 2278: 2274: 2273: 2265: 2258: 2253: 2249: 2242: 2234: 2230: 2226: 2222: 2218: 2214: 2210: 2203: 2195: 2189: 2185: 2184: 2176: 2167: 2165: 2163: 2153: 2151: 2135: 2131: 2127: 2126: 2119: 2107: 2103: 2099: 2093: 2089: 2072: 2068: 2057: 2054: 2052: 2049: 2048: 2042: 2040: 2036: 2032: 2028: 2024: 2019: 2017: 2013: 2012:the OSI model 2009: 2005: 2000: 1999: 1993: 1991: 1987: 1983: 1973: 1971: 1968:is the first 1967: 1962: 1957: 1955: 1951: 1947: 1943: 1939: 1934: 1932: 1928: 1924: 1920: 1919:extensibility 1916: 1911: 1901: 1898: 1892: 1890: 1886: 1885:authenticated 1881: 1879: 1878:extensibility 1875: 1871: 1870:side-channels 1866: 1860: 1850: 1846: 1844: 1840: 1834: 1832: 1824: 1823: 1818: 1814: 1813: 1808: 1805: 1800: 1799: 1798:network layer 1794: 1790: 1789: 1784: 1780: 1779: 1778:session layer 1774: 1770: 1769: 1764: 1761: 1756: 1755: 1750: 1749: 1748: 1745: 1743: 1742:peer entities 1739: 1733: 1731: 1727: 1723: 1711: 1706: 1704: 1699: 1697: 1692: 1691: 1689: 1688: 1681: 1678: 1676: 1673: 1671: 1668: 1666: 1663: 1661: 1658: 1656: 1653: 1651: 1648: 1646: 1643: 1641: 1638: 1636: 1633: 1631: 1628: 1626: 1623: 1621: 1618: 1616: 1613: 1611: 1608: 1606: 1603: 1601: 1598: 1596: 1593: 1592: 1589: 1583: 1582: 1575: 1572: 1570: 1567: 1565: 1561: 1558: 1556: 1553: 1551: 1548: 1546: 1543: 1541: 1538: 1536: 1533: 1531: 1528: 1526: 1523: 1521: 1518: 1516: 1513: 1511: 1508: 1506: 1503: 1501: 1498: 1496: 1493: 1491: 1488: 1486: 1483: 1481: 1478: 1477: 1474: 1468: 1467: 1460: 1457: 1455: 1452: 1450: 1447: 1445: 1442: 1440: 1437: 1435: 1432: 1430: 1427: 1424: 1420: 1417: 1413: 1410: 1408: 1405: 1404: 1403: 1400: 1399: 1396: 1395:Network layer 1390: 1389: 1382: 1379: 1377: 1374: 1372: 1369: 1367: 1364: 1362: 1359: 1357: 1354: 1353: 1350: 1344: 1343: 1335: 1333: 1330: 1328: 1325: 1323: 1320: 1318: 1315: 1313: 1310: 1308: 1305: 1304: 1301: 1300:Session layer 1295: 1294: 1287: 1284: 1282: 1279: 1277: 1274: 1272: 1269: 1267: 1264: 1262: 1259: 1258: 1255: 1249: 1248: 1241: 1240: 1236: 1234: 1231: 1229: 1226: 1224: 1221: 1219: 1216: 1214: 1211: 1209: 1206: 1204: 1201: 1199: 1196: 1194: 1191: 1188: 1184: 1181: 1179: 1176: 1174: 1171: 1169: 1166: 1164: 1161: 1159: 1156: 1154: 1151: 1150: 1147: 1141: 1140: 1136: 1130: 1127: 1126: 1118: 1116: 1112: 1108: 1097: 1095: 1094:routing loops 1091: 1087: 1081: 1077: 1075: 1071: 1067: 1063: 1059: 1055: 1051: 1047: 1043: 1039: 1029: 1027: 1023: 1019: 1018: 1012: 1010: 1006: 996: 994: 989: 980: 978: 974: 972: 968: 964: 960: 950: 948: 938: 934: 925: 921: 919: 915: 911: 903: 894: 891: 886: 878: 869: 867: 863: 859: 855: 850: 847: 842: 840: 836: 832: 828: 823: 821: 811: 802: 798: 796: 792: 788: 784: 779: 774: 771: 759: 756: 753: 750: 746: 743: 740: 736: 732: 728: 727:shared medium 724: 720: 717: 714: 709: 706: 703: 699: 696: 692: 689: 686: 685: 680: 676: 673: 670: 665: 662: 659: 654: 650: 645: 642: 639: 635: 631: 626: 623: 622: 621: 617: 615: 611: 600: 598: 594: 590: 586: 581: 578: 574: 570: 560: 558: 553: 551: 547: 543: 539: 535: 530: 528: 524: 519: 517: 513: 509: 505: 501: 497: 493: 489: 485: 475: 467: 465: 460: 458: 454: 450: 446: 442: 438: 433: 430: 425: 423: 419: 415: 409: 407: 403: 402:shared memory 397: 395: 391: 387: 376: 374: 370: 365: 363: 359: 355: 351: 347: 343: 339: 335: 330: 328: 324: 320: 316: 312: 308: 304: 300: 296: 292: 287: 285: 281: 277: 273: 268: 266: 262: 258: 254: 250: 248: 244: 240: 235: 231: 227: 223: 218: 216: 212: 208: 204: 200: 199:Steve Crocker 196: 192: 189:, written by 188: 187:1822 protocol 184: 179: 177: 173: 169: 165: 161: 160:Donald Davies 157: 153: 147: 146:Protocol Wars 132: 130: 126: 122: 118: 114: 110: 106: 101: 99: 94: 92: 90: 84: 80: 76: 72: 66: 64: 60: 56: 53:and possible 52: 51:communication 48: 44: 40: 36: 32: 28: 24: 19: 6581:Cyberwarfare 6240:Cryptography 5366: 5318:Multiplexing 5193:Transmission 5158:Nikola Tesla 5148:Henry Sutton 5103:Samuel Morse 5033:Robert Hooke 4998:Amos Dolbear 4933:John Bardeen 4852: 4832:Telautograph 4736:Mobile phone 4691:Edholm's law 4674:social media 4607:Broadcasting 4523:. ABC-CLIO. 4519: 4483: 4477: 4449: 4422: 4394: 4366: 4338: 4310: 4282: 4254: 4234: 4212: 4193: 4173: 4169:C.A.R. Hoare 4150: 4119: 4095: 4072: 4045: 4035:Bibliography 4023: 4011: 3999: 3987: 3975: 3970:, p. 1. 3963: 3951: 3939: 3927: 3915: 3903: 3891: 3879: 3867: 3855: 3843: 3831: 3826:, p. 3. 3811:, p. 2. 3804: 3792: 3787:, p. 6. 3780: 3775:, p. 5. 3768: 3748:, p. 4. 3741: 3736:, p. 3. 3721:, p. 2. 3702: 3692: 3686: 3677: 3667: 3661: 3653: 3648: 3642: 3633: 3624: 3615: 3606: 3597: 3588: 3579: 3570: 3561: 3552: 3540:. Retrieved 3526: 3517: 3512:, p. 4. 3505: 3496: 3469: 3465: 3455: 3446: 3429: 3425: 3419: 3410: 3391: 3382: 3373: 3367: 3358: 3352: 3340:. Retrieved 3336:the original 3325: 3316: 3310: 3302:IEEE Network 3301: 3295: 3286: 3277: 3268: 3259: 3250: 3230:the original 3224: 3217: 3208: 3199: 3190: 3181: 3172: 3163: 3154: 3145: 3136: 3127: 3118: 3109: 3100: 3088:. Retrieved 3079: 3070: 3058:. Retrieved 3054:the original 3043: 3031:. Retrieved 3027:the original 3016: 3004:. Retrieved 3000:the original 2989: 2977:. Retrieved 2968: 2959: 2950: 2941: 2908: 2887: 2878: 2866:. Retrieved 2846: 2834:. Retrieved 2813: 2802: 2792: 2780:. Retrieved 2771: 2762: 2742: 2736: 2703: 2699: 2693: 2660: 2656: 2650: 2620:(1): 66–71. 2617: 2613: 2607: 2598: 2591:. Retrieved 2563: 2559: 2546: 2531: 2522: 2515:. Retrieved 2503: 2494: 2486: 2471: 2464: 2456: 2441: 2431: 2421:11 September 2419:. Retrieved 2405: 2393:. Retrieved 2384: 2375: 2365: 2358: 2337: 2328: 2308: 2304: 2294: 2286: 2271: 2264: 2255: 2251: 2241: 2216: 2212: 2202: 2182: 2175: 2140:24 September 2138:, retrieved 2124: 2118: 2092: 2071: 2038: 2034: 2030: 2026: 2022: 2020: 2016:ISO layering 2015: 2011: 2007: 2003: 1997: 1994: 1979: 1958: 1942:encapsulated 1935: 1913: 1904:Ossification 1893: 1882: 1864: 1862: 1847: 1835: 1828: 1820: 1810: 1796: 1792:connections. 1786: 1776: 1766: 1752: 1746: 1741: 1737: 1734: 1725: 1719: 1237: 1114: 1110: 1106: 1103: 1086:time-to-live 1082: 1078: 1036:Some of the 1035: 1026:oligopolized 1015: 1013: 1002: 990: 986: 975: 956: 944: 935: 931: 922: 916: 912: 909: 887: 883: 851: 843: 824: 816: 799: 775: 768: 751:Flow control 682: 678: 668: 657: 652: 648: 633: 629: 618: 613: 609: 606: 582: 568: 566: 554: 531: 520: 487: 483: 481: 473: 461: 434: 426: 418:TCP/IP model 410: 398: 382: 366: 333: 331: 303:RĂ©mi DesprĂ©s 288: 269: 253:Bob Metcalfe 251: 226:Louis Pouzin 219: 214: 180: 155: 151: 149: 107:(IETF). The 102: 95: 86: 82: 67: 29:to transmit 22: 20: 18: 6591:Video games 6571:Digital art 6328:Concurrency 6197:Data mining 6109:Probability 5849:Interpreter 5518:NPL network 5230:Radio waves 5168:Alfred Vail 5078:Hedy Lamarr 5063:Dawon Kahng 5023:Elisha Gray 4983:Yogen Dalal 4908:Nasir Ahmed 4842:Teleprinter 4706:Heliographs 4486:: 619–639. 3992:Hardie 2019 3982:, A.5. TCP. 2868:23 February 2836:23 February 2593:23 February 2039:application 1927:middleboxes 1889:middleboxes 1660:IEEE 802.16 1655:IEEE 802.15 1650:IEEE 802.11 1574:IEEE 802.11 1545:Frame Relay 1088:values are 1048:(ITU), the 1044:(ISO), the 1022:monopolized 973:standard). 906:boundaries. 723:half-duplex 548:), and the 494:, often in 284:Yogen Dalal 274:(TCP). Its 176:NPL network 71:implemented 31:information 6664:Categories 6649:Glossaries 6521:E-commerce 6114:Statistics 6057:Algorithms 5854:Middleware 5710:Peripheral 5564:Antarctica 5523:Toasternet 5445:Television 4928:Paul Baran 4860:Television 4844:(teletype) 4837:Telegraphy 4815:transistor 4793:Phryctoria 4763:Photophone 4741:Smartphone 4731:Mass media 4467:1893/26111 4147:M. Ben-ari 3472:(2): 323. 3388:Fowler, M. 3319:. Pearson. 3090:15 January 3006:21 October 2538:, p.  2482:1845426754 2348:(Report). 2098:US 7529565 2084:References 1976:Taxonomies 1961:encrypting 1948:(TCP) and 1865:wire image 1853:Wire image 1645:IEEE 802.3 1569:Q.922 LAPF 1540:IEEE 802.3 1520:IEEE 802.2 1307:Named pipe 789:, such as 739:contention 496:plain text 478:Text-based 390:algorithms 257:Xerox PARC 203:Jon Postel 89:algorithms 6470:Rendering 6465:Animation 6096:computing 6047:Semantics 5745:Processor 5548:Americas 5537:Locations 5508:Internet2 5269:Bandwidth 4973:Vint Cerf 4870:streaming 4848:Telephone 4788:Semaphore 4679:streaming 4501:2164/8317 4115:R. Braden 2782:8 October 2720:1558-1896 2677:1558-1896 2642:206443072 2634:1934-1547 2580:1558-0857 2512:0013-0613 2395:8 October 2325:0018-9219 2186:. Orion. 2106:Oticon AS 2104: and 1859:Wire data 1680:Bluetooth 1665:IEEE 1394 1625:SONET/SDH 1586:1.  1471:2.  1449:AppleTalk 1393:3.  1347:4.  1298:5.  1252:6.  1144:7.  1129:OSI model 862:tunneling 846:OSI model 801:another. 735:collision 614:semantics 557:debugging 540:), SMTP ( 457:AppleTalk 422:OSI model 369:OSI model 217:concept. 207:Vint Cerf 43:semantics 6629:Category 6457:Graphics 6232:Security 5901:Compiler 5800:Networks 5697:Hardware 5616:Category 5503:Internet 5493:CYCLADES 5410:Ethernet 5360:Concepts 5284:terminal 5235:wireless 5058:Bob Kahn 4901:Pioneers 4726:Internet 4617:Cable TV 4233:(1984). 4171:(1985). 4149:(1982). 4094:(2000). 4070:(1991). 4044:(1999). 3542:10 March 3536:Archived 3488:11607967 3390:(2002). 3342:17 March 3304:: 20–24. 3084:Archived 2973:Archived 2859:Archived 2857:. 2006. 2827:Archived 2776:Archived 2728:23243636 2685:23639680 2584:Archived 2517:22 April 2439:(2000). 2389:Archived 2134:archived 2125:Protocol 2045:See also 2031:protocol 2023:protocol 1938:Internet 1876:and the 1806:control. 1239:more.... 858:Ethernet 827:Internet 805:Layering 757:Queueing 713:timeouts 632:and the 420:and the 362:Internet 295:datagram 263:and the 261:Ethernet 222:CYCLADES 191:Bob Kahn 152:protocol 129:converge 119:handles 63:software 59:hardware 6639:Outline 5636:Commons 5626:Outline 5579:Oceania 5498:FidoNet 5483:ARPANET 5296:circuit 4865:digital 4594:History 4510:1846371 3080:Uml.org 2233:8172150 2035:service 2027:service 1874:privacy 1722:ARPANET 1312:NetBIOS 1233:NETCONF 674:Routing 634:payload 523:parsing 445:IPX/SPX 379:Concept 334:TCP/IP. 249:(TCP). 183:ARPANET 181:On the 166:at the 140:History 5574:Europe 5544:Africa 5528:Usenet 5488:BITNET 5425:Mobile 5301:packet 4810:MOSFET 4805:device 4602:Beacon 4527:  4508:  4241:  4219:  4200:  4181:  4157:  4102:  4080:  4052:  3486:  3398:  2979:31 May 2750:  2726:  2718:  2683:  2675:  2640:  2632:  2578:  2510:  2479:  2449:  2323:  2279:  2231:  2190:  2111:  1841:  1816:layer. 1600:RS-449 1595:RS-232 1562:  1423:ICMPv6 1223:Telnet 1187:HTTP/3 1178:Gopher 630:header 610:syntax 593:HTTP/3 589:HTTP/2 563:Binary 441:TCP/IP 356:  348:  338:SATNET 323:DECnet 278:  45:, and 39:syntax 6042:Logic 5883:tools 5557:South 5552:North 5513:JANET 5450:Telex 5440:Radio 5279:Nodes 5274:Links 5195:media 4773:Radio 4758:Pager 4686:Drums 4652:video 4647:image 4637:audio 4506:S2CID 3484:S2CID 3060:4 May 3033:4 May 2862:(PDF) 2855:(PDF) 2830:(PDF) 2823:(PDF) 2724:S2CID 2681:S2CID 2638:S2CID 2587:(PDF) 2556:(PDF) 2415:(PDF) 2346:(PDF) 2330:work. 2229:S2CID 2076:lost. 2063:Notes 1615:I.431 1610:I.430 1500:CSLIP 1444:IS-IS 1429:IPsec 1336:X.225 1332:SOCKS 1276:ASCII 1271:ASN.1 1135:layer 1062:radio 791:Mealy 679:route 585:EbXML 577:ASCII 534:ASCII 504:UTF-8 500:ASCII 470:Types 453:AX.25 386:state 299:CCITT 234:hosts 117:ITU-T 5881:and 5754:Form 5750:Size 5569:Asia 5455:UUCP 5415:ISDN 4525:ISBN 4441:9419 4413:9170 4385:9065 4357:8558 4329:8546 4301:7258 4273:5704 4239:ISBN 4217:ISBN 4198:ISBN 4179:ISBN 4155:ISBN 4138:1122 4100:ISBN 4078:ISBN 4050:ISBN 3544:2023 3396:ISBN 3344:2017 3092:2017 3062:2006 3035:2006 3008:2014 2981:2022 2870:2020 2838:2020 2784:2022 2748:ISBN 2716:ISSN 2673:ISSN 2630:ISSN 2595:2020 2576:ISSN 2540:78-9 2519:2020 2508:ISSN 2477:ISBN 2447:ISBN 2423:2017 2397:2022 2321:ISSN 2277:ISBN 2188:ISBN 2142:2012 1984:and 1970:IETF 1966:QUIC 1868:and 1863:The 1843:2026 1819:The 1809:The 1795:The 1785:The 1775:The 1765:The 1751:The 1564:LAPB 1560:X.25 1535:L2TP 1515:PLIP 1505:SLIP 1495:HDLC 1490:SDLC 1454:X.25 1434:IGMP 1419:ICMP 1412:IPv6 1407:IPv4 1376:QUIC 1371:DCCP 1366:SCTP 1322:PPTP 1261:MIME 1228:DHCP 1218:SNMP 1213:SMTP 1203:SMPP 1183:HTTP 1153:NNTP 1070:NMEA 1068:the 1024:(or 971:IETF 969:(an 961:(an 844:The 793:and 597:EDOC 595:and 573:byte 525:and 516:JSON 455:and 449:X.25 392:and 358:1123 352:and 350:1122 325:and 307:X.25 289:The 220:The 205:and 109:IEEE 77:. A 5460:WAN 5430:NGN 5420:LAN 4701:Fax 4642:DCT 4496:hdl 4488:doi 4462:hdl 4454:doi 4438:RFC 4428:doi 4410:RFC 4400:doi 4382:RFC 4372:doi 4354:RFC 4344:doi 4326:RFC 4316:doi 4298:RFC 4288:doi 4270:RFC 4260:doi 4135:RFC 4125:doi 3474:doi 3434:doi 2708:doi 2665:doi 2622:doi 2568:doi 2313:doi 2221:doi 2014:or 2006:or 1839:RFC 1675:USB 1640:DSL 1635:OTN 1630:PON 1620:PDH 1555:PPP 1530:MAC 1525:LLC 1510:GFP 1485:ARP 1480:ATM 1459:PLP 1439:IPX 1381:SPX 1361:UDP 1356:TCP 1327:RTP 1317:SAP 1286:PGP 1281:TLS 1266:XDR 1208:SSH 1198:NTP 1193:NFS 1173:FTP 1168:DNS 1163:SSI 1158:SIP 1133:by 1009:IBM 963:ISO 737:or 529:). 514:or 512:XML 502:or 486:or 354:RFC 346:RFC 280:675 276:RFC 49:of 6666:: 5752:/ 4504:. 4494:. 4484:19 4482:. 4460:. 4436:. 4426:. 4408:. 4398:. 4380:. 4370:. 4352:. 4342:. 4324:. 4314:. 4296:. 4286:. 4268:. 4258:. 4133:. 3816:^ 3753:^ 3726:^ 3711:^ 3534:. 3482:. 3470:30 3468:. 3464:. 3428:. 3238:^ 3082:. 3078:. 2971:. 2967:. 2929:^ 2917:^ 2896:^ 2801:. 2774:. 2770:. 2722:. 2714:. 2704:47 2702:. 2679:. 2671:. 2661:48 2659:. 2636:. 2628:. 2618:33 2616:. 2597:. 2582:. 2574:. 2564:22 2562:. 2558:. 2521:. 2502:. 2485:. 2455:. 2387:. 2383:. 2327:. 2319:. 2309:66 2307:. 2303:. 2285:. 2254:. 2250:. 2227:. 2215:. 2211:. 2161:^ 2149:^ 2132:, 2128:, 2018:. 1995:A 1845:. 1402:IP 949:. 591:, 587:, 567:A 552:. 518:. 510:, 482:A 459:. 451:, 447:, 443:, 424:. 364:. 329:. 178:. 100:. 93:. 61:, 41:, 21:A 5690:. 5670:e 5663:t 5656:v 5587:) 5583:( 4578:e 4571:t 4564:v 4533:. 4512:. 4498:: 4490:: 4470:. 4464:: 4456:: 4443:. 4430:: 4415:. 4402:: 4387:. 4374:: 4359:. 4346:: 4331:. 4318:: 4303:. 4290:: 4275:. 4262:: 4247:. 4225:. 4206:. 4187:. 4163:. 4140:. 4127:: 4108:. 4086:. 4058:. 3696:. 3671:. 3546:. 3490:. 3476:: 3440:. 3436:: 3430:2 3404:. 3346:. 3094:. 3064:. 3037:. 3010:. 2983:. 2872:. 2840:. 2786:. 2756:. 2730:. 2710:: 2687:. 2667:: 2644:. 2624:: 2570:: 2425:. 2399:. 2315:: 2235:. 2223:: 2217:9 2196:. 1709:e 1702:t 1695:v 1425:) 1421:( 1189:) 1185:( 687:. 671:. 660:. 653:1

Index

communications system
information
physical quantity
syntax
semantics
synchronization
communication
error recovery methods
hardware
software
implemented
technical standard
programming language
algorithms
protocol stack
Internet Engineering Task Force
IEEE
International Organization for Standardization
ITU-T
telecommunications
public switched telephone network
converge
Protocol Wars
Donald Davies
packet switching
National Physical Laboratory
Roger Scantlebury
NPL network
ARPANET
1822 protocol

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑