A protocol (also called communications protocol) is
|“||a standard agreed upon by groups of users to insure interoperability on a network. It is a detailed process the sender and receiver agree upon for exchanging data.||”|
|“||[a] set of rules (i.e., formats and procedures) to implement and control some type of association (e.g., communication) between systems.||”|
|“||a set of digital rules for data exchange within or between computer systems. Protocols are valuable assets for the Internet infrastructure because they allow meaningful communication between different computer systems.||”|
A protocol is
"Protocols allow data to be taken apart for faster transmission, transmitted, and then reassembled at the destination in the correct order. The protocol used determines the way errors are checked, the type of compression, the way the sender indicates the end of the transmission, and the way the receiver indicates that the message has been received. Protocols can describe low-level details of machine-to-machine interfaces (e.g., the order in which bits and bytes are sent across a wire) or high-level exchanges between allocation programs (e.g., the way in which two programs transfer a file across the Internet)."
The protocol of one system does not necessarily work with another system, and there is an effort to standardize or translate the various protocols so that computers can all talk easily with one another. To make this possible, some protocols may have to be abandoned, while others may be modified or translated when necessary.
Two sets of protocols — the Domain Name System (DNS) and the Border Gateway Protocol (BGP) — are essential for ensuring the uniqueness of each e-mail and website address and for facilitating the routing of data packets between autonomous systems, respectively.
- ↑ NIST Special Publication 800-82, at B-6.
- ↑ Threat Landscape and Good Practice Guide for Internet Infrastructure, at 6.
- ↑ Department of the Army, Supervisory Control and Data Acquisition (SCADA) Systems for Command, Control, Communications, Computer, Intelligence, Surveillance, and Reconnaissance (C4ISR) Facilities, at B-4 (Jan. 21, 2006) (full-text).
- ↑ US-CERT,"Security of the Internet" (full-text).
- ↑ Privacy Impact Assessment EINSTEIN Program: Collecting, Analyzing, and Sharing Computer Security Information Across the Federal Civilian Government, at 7.
See also Edit
- Address resolution protocol
- Anonymous file transfer protocol
- Authentication protocol
- BitTorrent protocol
- Border Gateway Protocol
- Challenge-response protocol
- Communications protocol
- Cryptographic protocol
- Data communications protocol
- Dynamic Host Configuration Protocol
- E-mail protocol
- Extensible Authentication Protocol
- Exterior Gateway Protocol
- FastTrack protocol
- File Transfer Protocol
- Handshake protocol
- Host Identity Protocol
- HyperText Transfer Protocol
- Hypertext Transfer Protocol Secure
- Interconnected Voice Over Internet Protocol
- Interior Gateway Protocol
- Internet Control Message Protocol
- Internet Group Management Protocol
- Internet protocol
- Internet Protocol Version 4
- Internet Protocol version 6
- Internet Protocol cloud
- Internet protocol suite
- Network Control Protocol
- Network News Transfer Protocol
- Network protocol
- Online Certificate Status Protocol
- Open protocol
- Point to Point Protocol
- Post Office Protocol
- Proprietary protocol
- Protocol suite
- Real-time streaming protocol
- Remote Desktop Protocol
- Routing protocol
- Security Content Automation Protocol
- Short Message Peer-to-Peer Protocol
- Simple mail transfer protocol
- Simple Network Management Protocol
- SNI protocols
- Synchronization protocol
- Transmission Control Protocol
- Transport protocol
- Trivial File Transfer Protocol
- Tunneled password protocol
- User Datagram Protocol
- Wireless Application Protocol