Overview#
Protocol is a system of rules that allow two or more entities of a communications system to transmit data.Multiple Protocol often describe different aspects of a single communication. A group of Protocols designed to work together are known as a Protocol Suite; when implemented in software they are a Protocol Stack.
Protocol are a mechanism for achieving polymorphism.[1]!! Items for a Good Protocol
More Information#
There might be more information for this subject on one of the following:- 0-RTT Handshakes
- 3D Secure
- 4G
- ALOHA
- API Service Delivery
- AWS Application Load Balancer
- AWS Elastic File System
- Absolute URI
- Access Proxy
- Access Token Validation
- Acknowledgement
- ActiveMQ
- Actor
- Address Resolution Protocol
- Advanced Message Queuing Protocol
- Agreement
- Apache Fortress
- AppAuth
- Application Layer
- Application Load Balancing
- Application Programming Interface
- Application-Layer Protocol Negotiation
- Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants
- Asynchronous Transfer Mode
- Authentication Protocol
- Authentication, Authorization and Accounting (AAA) Transport Profile
- Authenticator Assurance Levels
- Authenticity
- Automatic Certificate Management Environment
- BEAST
- BUS
- Back-channel Communication
- Backus Normal Form
- Bandit-project.org
- Base Transceiver Station
- Basic Encoding Rules
- BitShares
- Bitcoin block
- Blockchain
- Border Gateway Protocol
- Boulder
- Bridge
- Building Automation
- Bulk Update-Replication Protocol
- Burrows Abadi Needham logic
- CISCO Commands
- COPS Usage for Policy Provisioning
- CRAM-MD5
- Camellia
- Carrier-Sense Multiple Access
- Cell-Site Simulators
- Certbot
- Certificate Transparency
- Certification Authority Browser Forum
- Challenge-response
- Channel Binding
- Client Error
- Client To Authenticator Protocol
- Commitment Scheme
- Common Internet File System
- Common Open Policy Service
- Communication
- Communication Layers
- Compare Request
- Computational Hardness Assumption
- Constrained Application Protocol
- Create Read Update Delete
- CredSSP
- Cross Origin Resource Sharing
- Cryptographic Primitive
- Cryptosystem
- CurveCP
- CurveZMQ
- DECnet
- DHost
- DIAMETER
- DID Document
- DID Service Endpoint
- DIT Locations For NIS
- DIXIE
- DNS Privacy Considerations
- DNS over HTTPS
- DNS-Based Authentication of Named Entities
- DNSCrypt
- DNSCurve
- Dat Protocol
- Data In Transit
- Data Leakage
- Data-link Layer
- Decentralized system
- Definitions of Managed Objects for Drip-Type Heated Beverage Hardware Devices using SMIv2
- Deprecating Secure Sockets Layer Version 3.0
- Deprecating TLSv1.0 and TLSv1.1
- Differences between LDAP 2 and 3 Protocols
- Diffie-Hellman
- Digital Imaging and Communications in Medicine
- Digital Signature
- Direct Anonymous Attestation
- Directory Service
- Discoverability
- Discovery Mechanism
- Distributed Consensus
- Distributed Ledger Technology
- Domain Name System
- Domain-based Message Authentication, Reporting & Conformance
- DomainKeys Identified Mail
- Dotdot
- Double Ratchet Algorithm
- Draft-ietf-pkix-generalname-00
- ECMA TR32
- ECMQV
- EDirectory
- EXtensible Data Interchange
- Electronic Code Book
- Elliptic Curve Diffie-Hellman
- Emergency Location Service
- Enabler
- Encapsulating Security Payload
- Encoding claims in the OAuth 2 state parameter using a JWT
- Entity Authentication
- Error
- Ethernet
- Event eXchange Protocol
- Exchange
- Extensible Authentication Protocol
- Extensible Resource Identifier
- FIDO Standards
- FIDO-CTAP
- FIPS 180
- FREAK
- Fast Healthcare Interoperability Resources
- Federated Authorization for UMA 2.0
- Federation Assurance Level
- Federation Models
- File Replication Service Protocol
- Financial API
- Financial transaction
- Financial-grade API
- Front-channel communication
- Fully Hashed Menezes-Qu-Vanstone
- Functional Programming
- Geocast
- Global System for Mobile Communications
- Gopher
- Gossip protocol
- Grant Negotiation and Authorization Protocol
- GraphQL
- H.323
- HTTP
- HTTP 101
- HTTP 400
- HTTP Status Code
- HTTP Strict Transport Security
- HTTPS Interception
- History of LDAP
- HotStuff
- How Domain Controllers Are Located in Windows
- How SSL-TLS Works
- Humorous RFCs
- Hyper Text Coffee Pot Control Protocol
- Hypertext Transfer Protocol
- IANA Registry
- IEEE 802
- IEEE 802.15.4
- IEEE 802.1X
- IMessage
- ISAKMP
- ISO 10646
- ISO Development Environment
- Identifier
- Identity Overlay Network
- Identity Web Services Framework
- Impersonation-resistant
- Implementation Vulnerability
- Initiator
- Instant Messaging
- Inter-Planetary File System
- Intermediary
- Internet Key Exchange
- Internet Layer
- Internet Message Access Protocol
- Internet Protocol
- Internet Protocol Security
- Internet Protocol Suite
- Internet Relay Chat
- Internet Research Task Force
- Internet Threat Model
- Internet of Things
- Internetwork Packet Exchange
- Isode Limited
- JLINC
- JSON Identity Suite
- JSON Resource Descriptor
- JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants
- Javascript Object Signing and Encryption
- Jughead
- Kerberos
- Kerberos Cryptosystem Negotiation Extension
- Kerberos Delegation
- Kerberos Encryption Types
- Key Generation
- Key Management
- Key agreement
- Key wrapping
- Keyed-Hash Message Authentication Code
- Known Cipher Suites
- LAN Manager
- LAN Manager authentication level
- LDAP
- LDAP Descriptor
- LDAP Family
- LDAP Filter Choices
- LDAP ModifyRequest Operations
- LDAP Protocol Exchanges
- LDAP Protocol dependencies
- LDAP Result
- LDAP Syntaxes and Matching Rules
- LDAPSyntaxes
- LDAPv3
- LOA 3
- Lets encrypt
- LibraBFT
- Link Layer
- Linux Boot Process
- LoRa
- LoRaWAN
- Load Balancing
- Local Security Authority
- Logical Access Control
- Logical Link Control
- Logjam
- Loop Start
- Loopback
- M-04-04 Level of Assurance (LOA)
- MS-ADDM
- MS-CHAP
- MS-WKST
- Media-type
- Menezes-Qu-Vanstone
- Merkle Tree
- Message Passing Interface
- Message-oriented Middleware
- Messaging Layer Security
- Micropub
- Microservice
- MimbleWimble
- Minimal Lower Layer Protocol
- Mix network
- Mobile Application Part
- Mobile Connect
- Money
- Multiple-channel Authentication
- NCP Packet
- NCP Primary Authentication Protocol
- NDS Authentication
- NDS Connection States
- NDS Replica Pointer
- NIS
- NIST.SP.800-57
- NMAS Result Codes
- NSCD
- NT LAN Manager
- Nakamoto consensus
- Native application
- Ncpengine
- NetWare
- Netstat
- Network
- Network Control Program
- Network File System
- Network Layer
- Network Time Protocol
- Node
- Nonce
- Novell Directory Services
- Novell INC
- OAuth
- OAuth 2.0
- OAuth 2.0 JWT Secured Authorization Request
- OAuth 2.0 NOT an Authentication protocol
- OAuth 2.0 Security Considerations
- OAuth 2.0 Software Statement
- OAuth 2.0 Threat Model and Security Configurations
- OAuth 2.0 Token Exchange
- OAuth 2.0 Token Introspection
- OAuth 2.0 Vulnerabilities
- OXD
- Oauth.xyz
- Off-the-Record Messaging
- Oidc-client-js
- Online Certificate Status Protocol
- Open Access
- Open Protocol for Access Control, Identification, and Ticketing with privacY
- Open Systems Interconnection
- OpenID
- OpenID Connect
- OpenID Connect Federation
- OpenID Connect Federation Async
- OpenID Connect Front-Channel Logout
- OpenID Connect Profile for SCIM Services
- OpenSSL
- Opportunistic Security
- PARC Universal Packet
- Packet segmentation
- Pass-the-hash
- Password Authentication Protocol
- Password-authenticated Key Exchange
- Paxos Protocol
- Pay-To-Public-Key-Hash
- Perfect Forward Secrecy
- Physical Layer
- Platform Authenticator
- Plenum Byzantine Fault Tolerant Protocol
- Point-to-Point Protocol
- Polyglot
- Portable Contacts
- PostMessage
- Preparation, Enforcement, and Comparison of Internationalized Strings
- Primary Refresh Token
- Privacy Considerations
- Private Communications Technology
- Proof-of-Stake
- Proof-of-Work
- Proprietary Protocol
- Protected Extensible Authentication Protocol
- Protocol Buffers
- Protocol Client
- Protocol Extensibility
- Protocol Server
- Protocol Stack
- Protocol Suite
- Protocol Vulnerability
- Protocol ossification
- Prover
- Publish-Subscribe
- PwdProperties
- QUIPU
- Quick UDP Internet Connections
- RFC
- RFC 0793
- RFC 1001
- RFC 1002
- RFC 1123
- RFC 1928
- RFC 3244
- RFC 3912
- RFC 4510
- RFC 5246
- RFC 5891
- RFC 5905
- RFC 6455
- RFC 6698
- RFC 7384
- RFC 7532
- RFC 7539
- RFC 7564
- RFC 7644
- RFC 7671
- RFC 7862
- RFC 8264
- Real-time Transport Protocol
- Recipient
- Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
- Record Protocol
- Redundant Byzantine Fault Tolerance
- Relational Database Management System
- Reliable protocol
- Remote Authentication Dial-In User Service
- Remote Desktop Protocol
- Remote Procedure Call
- ReplicaAddressHint
- Replication
- Representational State Transfer
- Resource Action
- Resource ReSerVation Protocol
- Rich Communication Services
- Ripple Consensus Protocol Algorithm
- Ripple Transaction Protocol
- Risk-Based Authentication
- Roaming Authenticator
- Roughtime
- Round-trips
- Routing Information Protocol
- SAML Bindings
- SAML Protocols
- SAML V2.0
- SASL
- SCIM
- SLAPD
- SNMP
- SOAP back-channel
- SPDY
- SPNEGO
- SQL Injection
- SSL Handshake Failed
- SSL-TLS Interception
- SSLv3
- Same Origin Policy
- Schannel SSP
- Secure Electronic Transaction
- Secure Element
- Secure Remote Password Protocol
- Secure WEB Page Information
- Secure connection
- Security Descriptor Description Language
- Security Support Provider
- Security Support Provider Interface
- Security Token Service
- Sender Policy Framework
- Sequenced Packet Exchange
- Server Message Block
- Session
- Session Initiation Protocol
- Session Layer
- SessionData
- ShareNet
- Shared Secret
- Short Message Service
- Sidetree protocol
- Signalling System No. 7
- Signatures with efficient protocols
- Simple Mail Transfer Protocol
- Smart contracts
- Smart endpoints and dumb pipes
- SmartMessage Language
- Socket Secure
- Software development practice
- Solid
- Sovrin
- State
- Stateful
- Stateless
- Stellar Consensus Protocol
- Stream Control Transmission Protocol
- SuperSet Software Group
- Synchronous Optical NETworking
- System for Cross-domain Identity Management
- TLS
- TLS 1.3
- TLS 1.3 Cipher Suites
- TLS Client Authentication
- TLS Full Handshake
- Telecommunications
- Telegram
- Telegram Open Network
- The Infinite Monkey Protocol Suite
- The Twelve Networking Truths
- Thread network layer
- Thunderbolt
- Ticket Granting Service
- Time synchronization
- Token
- Token Binding Protocol
- Token Ring
- Transmission Control Protocol
- Transport Layer
- Transport Layer Security
- Trent
- Triple DES
- Trust Anchor Management Protocol
- TrustAuthIncoming
- TrustAuthOutgoing
- Turn Operation
- Two Generals Problem
- U-Prove
- U2F device
- UPort
- URL
- USB Type-C
- Ungermann-Bass
- Uniform Resource Identifier
- Universal Description, Discovery, and Integration
- Universal Inbox
- Universal Second Factor
- Universal Second Factor Challenges
- Universal Serial Bus
- Unkeyed Primitives
- User-Managed Access
- User-agent
- Utility
- Veronica
- Virtual Authenticator
- Voice
- WS-ReliableMessaging
- Walter
- Web Linking
- Web Proxy Auto-Discovery Protocol
- Web Services Dynamic Discovery
- Web host-meta data
- WebAuthN
- WebAuthn Authenticator Model
- WebFinger
- WebSocket
- Wide Area Information Server
- Windows Authentication Package
- Windows Integrated Authentication
- X.500
- X25519
- Xerox Network Systems
- Yadis
- Yubikey NEO
- Z-Wave
- Z-Wave Network
- Z-Wave Node
- Zcash
- Zero-knowledge proof
- Zigbee
- Zigbee Network
- [#1] - An Introduction to Protocols
- based on information obtained 2016-07-02