什么原因导致性功能减退| 三点水加盆读什么| mm是什么意思单位| 胃食管反流吃什么中成药最好| 两点水有什么字| 国历是什么意思| 夏天喝什么茶| 世界上最大的岛是什么岛| 神话故事有什么| 22年什么婚| 青云志3什么时候上映| 肠粉是用什么粉做的| 郑字五行属什么| 肚脐两边疼是什么原因| igm是什么| 为什么爱放屁| 三马念什么| 勇者胜的上半句是什么| 细菌性炎症用什么药| 什么天空填动词| 中秋节是什么时候| 高血压高血糖挂什么科| 一台什么| 金酒兑什么好喝| 透析病人吃什么水果好| 慢性非萎缩性胃炎伴糜烂是什么意思| 食管炎吃什么药最好| 梅毒的病原体是什么| 什么是云| 什么情| 头顶头发稀少是什么原因| 九月二十八是什么星座| pfs是什么意思| 伏天是什么时候| 种植牙有什么危害| 英雄难过美人关是什么生肖| 腿麻是什么原因引起的| 大姨妈来了两天就没了什么原因| 2015年是什么生肖| 43岁属什么生肖| 火龙果什么时候成熟| 米放什么不生虫子| 诬赖是什么意思| 脾不好吃什么药最见效| 尿常规红细胞高是什么原因| 草字头加果念什么| 中药包煎是什么意思| 非浅表性胃炎是什么意思| 你要什么| gn是什么意思| 总打喷嚏是什么原因| 凌晨三点醒是什么原因| 洋葱什么时候种| 什么是痉挛| 复辟什么意思| 类风湿不能吃什么食物| 人皇是什么意思| 肝有什么功能| 什么是小奶狗| 泌乳素高是什么原因| 一什么不| 牒是什么意思| fov是什么| 什么叫道德| 驻马店古代叫什么| 秦国是现在的什么地方| 钙化影是什么意思| 月是什么结构| 鸡汤用什么鸡| 声东击西是什么意思| 栉风沐雨什么意思| 怀孕有什么反应| 碘是什么颜色| 有什么烟| 冉字五行属什么| 肚子经常疼是什么原因| 经期喝酒会有什么危害| 夏天吃什么最好| 非布司他片是什么药| 肾阳虚的表现是什么| 舌苔白有齿痕吃什么药| 清华大学前身叫什么| 子宫肌腺症是什么病| 舌头裂缝是什么原因| 梦见螃蟹是什么预兆| 卷帘大将是干什么的| 加百列是什么天使| 40而不惑是什么意思| 做什么检查确诊是白塞| 蓝色配什么颜色最好看| 祭日和忌日是什么意思| 每个月月经都推迟是什么原因| 在屋顶唱着你的歌是什么歌| 化痰吃什么食物| 经常口腔溃疡吃什么药| 诱发电位是检查什么病的| 此刻朋友这杯酒最珍贵是什么歌| 海东青是什么| 成熟是什么意思| 大千是什么意思| 诬赖是什么意思| 今年77岁属什么生肖| doge是什么意思| 姊是什么意思| 水对什么| 排骨和什么菜搭配最好| sle是什么病| a型血为什么叫贵族血| 井是什么生肖| 什么是阴虚什么是阳虚| 什么叫肛裂| 吃牛肉有什么好处| 相思什么意思| 胃蛋白酶原1偏低是什么意思| 肺大泡是什么意思| 公务员属于什么行业| 机智如你是什么意思| 小腿红肿是什么原因引起的| 什么牌子的冰箱最好| 什么是地中海贫血| 梅子和杏有什么区别| 什么茶适合煮着喝| 什么品牌的洗衣机最好| 北京有什么特产| 月经期间肚子疼是什么原因| 尿发绿是什么原因| 同心同德是什么意思| trans什么意思| 什么是手帐| 幽门螺旋杆菌阳性什么症状| 包煎是什么意思| 肋间神经痛什么症状| 萎缩性胃炎能吃什么水果| 只要睡觉就做梦是什么原因| 血压高吃什么食物好| 母鸡是什么意思| 同房什么感觉| 慢性浅表性胃炎吃什么药好得快| 同型半胱氨酸查什么| 南无阿弥陀佛什么意思| 无毒不丈夫是什么意思| 右眉上方有痣代表什么| 肺气不足吃什么食物可以补肺气| 促甲状腺激素低是什么原因| 心率过低吃什么药| 失足是什么意思| 柳州有什么大学| c肽高说明什么| 拉肚子用什么药| 砂锅是什么材料做的| 石女什么意思| 藏族信仰什么教| 阴道有腥臭味用什么药| 劫富济贫是什么意思| 晚上8点半是什么时辰| 农历五月十八是什么星座| 痔疮是什么样的| 喉咙痰多是什么原因造成的| 发烧为什么会浑身酸疼| 药流之后需要注意什么| 一票制什么意思| 霄是什么意思| 冰冻三尺非一日之寒是什么意思| 花椒木有什么作用与功效| 特效药是什么意思| 内透声差是什么意思| 面瘫是什么原因造成的| 化疗期间吃什么| 一帘幽梦是什么意思| 樊胜美是什么电视剧| 儿童手指头脱皮什么原因引起的| 考试前紧张吃什么药最好能缓解| 脖子为什么会痒| 渐行渐远是什么意思| 儿童包皮挂什么科| 胃溃疡十二指肠溃疡吃什么药| 孕中期同房要注意什么| 45是什么生肖| 正缘是什么| 为什么四川总地震| 牛肚是什么部位| 什么是撤退性出血| 郁是什么意思| 肺部积液吃什么药| 好运是什么生肖| 一路长虹什么意思| 冷酷是什么意思| 革兰阳性杆菌是什么病| 大耗是什么意思| 辛辣的辛指什么| 山药有什么营养| 跨境电商是做什么的| 微信什么时候有的| 半身不遂的前兆是什么症状| 肺气肿有什么症状| 笃笃是什么意思| 02年属什么| 淇字五行属什么| 咖啡加牛奶叫什么| 什么情况下需要做心脏造影| 拉屎为什么是黑色的| 武汉都有什么区| 伺候是什么意思| 息肉是什么东西| 经常喝柠檬水有什么好处和坏处| 为什么射出来的精子是黄色的| 狗狗拉肚子吃什么药| 低血压头晕吃什么药| 神经炎用什么药| 白天尿少晚上尿多什么原因| 兴渠是什么菜| 血精和精囊炎吃什么药| 内痔有什么症状| 尼姑庵是什么意思| 血压高喝什么茶| 什么样的人容易孕酮低| 86年属虎是什么命| 组织部长是什么级别| 星期三左眼皮跳是什么预兆| 蚊子喜欢什么味道| 湿气重喝什么| 食道癌有什么症状| prg是什么意思| 伏羲女娲是什么关系| 王八蛋是什么意思| 你要干什么| 孕妇佩戴什么保胎辟邪| 开火念什么| 西瓜什么时候传入中国| 头发掉要用什么洗发水| 小孩放臭屁是什么原因| 孔雀翎是什么东西| 阴道息肉长什么样| amy是什么意思| 掉以轻心是什么意思| 刘邦和项羽是什么关系| 三月阳春好风光是什么生肖| 雯五行属什么| quilt什么意思| 熬是什么意思| 脂溢性皮炎用什么药膏| hoegaarden是什么啤酒| 数字7五行属什么| 栽赃是什么意思| 突然血糖高是什么原因引起的| 猫咪呕吐吃什么药可以解决| 七月开什么花| 空气栓塞取什么卧位| 额头青筋凸起是什么原因| 赵本山是什么学历| 棉毛布是什么面料| 香港的别称是什么| 咏柳是什么意思| 高冷是什么意思| 润滑油可以用什么代替| 黄晓明的老婆叫什么名字| 小麦秸秆是什么材质| 去医院要带什么| 松子吃多了有什么害处| 希特勒为什么杀犹太人| 肌酐高有什么症状表现| 粉碎性骨折是什么意思| 皮下脂肪瘤挂什么科| 脸痒痒是什么原因| 百度Jump to content

碑林区柏树林街道妇联举办家庭教育专题讲座(图)

From Wikipedia, the free encyclopedia
百度 任何一个座位的调换都会使飞机的重心发生一定的变化,在极端情况下会影响飞行安全。

A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any variation of a physical quantity. The protocol defines the rules, syntax, semantics, and synchronization of communication and possible error recovery methods. Protocols may be implemented by hardware, software, or a combination of both.[1]

Communicating systems use well-defined formats for exchanging various messages. Each message has an exact meaning intended to elicit a response from a range of possible responses predetermined for that particular situation. The specified behavior is typically independent of how it is to be implemented. Communication protocols have to be agreed upon by the parties involved.[2] To reach an agreement, a protocol may be developed into a technical standard. A programming language describes the same for computations, so there is a close analogy between protocols and programming languages: protocols are to communication what programming languages are to computations.[3] An alternate formulation states that protocols are to communication what algorithms are to computation.[4]

Multiple protocols often describe different aspects of a single communication. A group of protocols designed to work together is known as a protocol suite; when implemented in software they are a protocol stack.

Internet communication protocols are published by the Internet Engineering Task Force (IETF). The IEEE (Institute of Electrical and Electronics Engineers) handles wired and wireless networking and the International Organization for Standardization (ISO) handles other types. The ITU-T handles telecommunications protocols and formats for the public switched telephone network (PSTN). As the PSTN and Internet converge, the standards are also being driven towards convergence.

Communicating systems

[edit]

History

[edit]

The first use of the term protocol in a modern data-commutation context occurs in April 1967 in a memorandum entitled A Protocol for Use in the NPL Data Communications Network. Under the direction of Donald Davies, who pioneered packet switching at the National Physical Laboratory in the United Kingdom, it was written by Roger Scantlebury and Keith Bartlett for the NPL network.[5][6][7][8][9]

On the ARPANET, the starting point for host-to-host communication in 1969 was the 1822 protocol, written by Bob Kahn, which defined the transmission of messages to an IMP.[10] The Network Control Program (NCP) for the ARPANET, developed by Steve Crocker and other graduate students including Jon Postel and Vint Cerf, was first implemented in 1970.[11] The NCP interface allowed application software to connect across the ARPANET by implementing higher-level communication protocols, an early example of the protocol layering concept.[12]

The CYCLADES network, designed by Louis Pouzin in the early 1970s was the first to implement the end-to-end principle, and make the hosts responsible for the reliable delivery of data on a packet-switched network, rather than this being a service of the network itself.[13] His team was the first to tackle the highly complex problem of providing user applications with a reliable virtual circuit service while using a best-effort service, an early contribution to what will be the Transmission Control Protocol (TCP).[14][15][16]

Bob Metcalfe and others at Xerox PARC outlined the idea of Ethernet and the PARC Universal Packet (PUP) for internetworking.[17]

Research in the early 1970s by Bob Kahn and Vint Cerf led to the formulation of the Transmission Control Program (TCP).[18] Its RFC 675 specification was written by Cerf with Yogen Dalal and Carl Sunshine in December 1974, still a monolithic design at this time.

The International Network Working Group agreed on a connectionless datagram standard which was presented to the CCITT in 1975 but was not adopted by the CCITT nor by the ARPANET.[19] Separate international research, particularly the work of Rémi Després, contributed to the development of the X.25 standard, based on virtual circuits, which was adopted by the CCITT in 1976.[20][21] Computer manufacturers developed proprietary protocols such as IBM's Systems Network Architecture (SNA), Digital Equipment Corporation's DECnet and Xerox Network Systems.[22]

TCP software was redesigned as a modular protocol stack, referred to as TCP/IP. This was installed on SATNET in 1982 and on the ARPANET in January 1983. The development of a complete Internet protocol suite by 1989, as outlined in RFC 1122 and RFC 1123, laid the foundation for the growth of TCP/IP as a comprehensive protocol suite as the core component of the emerging Internet.[23]

International work on a reference model for communication standards led to the OSI model, published in 1984. For a period in the late 1980s and early 1990s, engineers, organizations and nations became polarized over the issue of which standard, the OSI model or the Internet protocol suite, would result in the best and most robust computer networks.[24][25][26]

Concept

[edit]

The information exchanged between devices through a network or other media is governed by rules and conventions that can be set out in communication protocol specifications. The nature of communication, the actual data exchanged and any state-dependent behaviors, is defined by these specifications. In digital computing systems, the rules can be expressed by algorithms and data structures. Protocols are to communication what algorithms or programming languages are to computations.[3][4]

Operating systems usually contain a set of cooperating processes that manipulate shared data to communicate with each other. This communication is governed by well-understood protocols, which can be embedded in the process code itself.[27][28] In contrast, because there is no shared memory, communicating systems have to communicate with each other using a shared transmission medium. Transmission is not necessarily reliable, and individual systems may use different hardware or operating systems.

To implement a networking protocol, the protocol software modules are interfaced with a framework implemented on the machine's operating system. This framework implements the networking functionality of the operating system.[29] When protocol algorithms are expressed in a portable programming language the protocol software may be made operating system independent. The best-known frameworks are the TCP/IP model and the OSI model.

At the time the Internet was developed, abstraction layering had proven to be a successful design approach for both compiler and operating system design and, given the similarities between programming languages and communication protocols, the originally monolithic networking programs were decomposed into cooperating protocols.[30] This gave rise to the concept of layered protocols which nowadays forms the basis of protocol design.[31]

Systems typically do not use a single protocol to handle a transmission. Instead they use a set of cooperating protocols, sometimes called a protocol suite.[32] Some of the best-known protocol suites are TCP/IP, IPX/SPX, X.25, AX.25 and AppleTalk.

The protocols can be arranged based on functionality in groups, for instance, there is a group of transport protocols. The functionalities are mapped onto the layers, each layer solving a distinct class of problems relating to, for instance: application-, transport-, internet- and network interface-functions.[33] To transmit a message, a protocol has to be selected from each layer. The selection of the next protocol is accomplished by extending the message with a protocol selector for each layer.[34]

Types

[edit]

There are two types of communication protocols, based on their representation of the content being carried: text-based and binary.[citation needed]

Text-based

[edit]

A text-based protocol or plain text protocol represents its content in human-readable format, often in plain text encoded in a machine-readable encoding such as ASCII or UTF-8, or in structured text-based formats such as Intel hex format, XML or JSON.

The immediate human readability stands in contrast to native binary protocols which have inherent benefits for use in a computer environment (such as ease of mechanical parsing and improved bandwidth utilization).

Network applications have various methods of encapsulating data. One method very common with Internet protocols is a text oriented representation that transmits requests and responses as lines of ASCII text, terminated by a newline character (and usually a carriage return character). Examples of protocols that use plain, human-readable text for its commands are FTP (File Transfer Protocol), SMTP (Simple Mail Transfer Protocol), early versions of HTTP (Hypertext Transfer Protocol), and the finger protocol.[35]

Text-based protocols are typically optimized for human parsing and interpretation and are therefore suitable whenever human inspection of protocol contents is required, such as during debugging and during early protocol development design phases.

Binary

[edit]

A binary protocol utilizes all values of a byte, as opposed to a text-based protocol which only uses values corresponding to human-readable characters in ASCII encoding. Binary protocols are intended to be read by a machine rather than a human being. Binary protocols have the advantage of terseness, which translates into speed of transmission and interpretation.[36]

Binary have been used in the normative documents describing modern standards like EbXML, HTTP/2, HTTP/3 and EDOC.[37] An interface in UML[38] may also be considered a binary protocol.

Basic requirements

[edit]

Getting the data across a network is only part of the problem for a protocol. The data received has to be evaluated in the context of the progress of the conversation, so a protocol must include rules describing the context. These kinds of rules are said to express the syntax of the communication. Other rules determine whether the data is meaningful for the context in which the exchange takes place. These kinds of rules are said to express the semantics of the communication.

Messages are sent and received on communicating systems to establish communication. Protocols should therefore specify rules governing the transmission. In general, much of the following should be addressed:[39]

Data formats for data exchange
Digital message bitstrings are exchanged. The bitstrings are divided in fields and each field carries information relevant to the protocol. Conceptually the bitstring is divided into two parts called the header and the payload. The actual message is carried in the payload. The header area contains the fields with relevance to the operation of the protocol. Bitstrings longer than the maximum transmission unit (MTU) are divided in pieces of appropriate size.[40]
Address formats for data exchange
Addresses are used to identify both the sender and the intended receiver(s). The addresses are carried in the header area of the bitstrings, allowing the receivers to determine whether the bitstrings are of interest and should be processed or should be ignored. A connection between a sender and a receiver can be identified using an address pair (sender address, receiver address). Usually, some address values have special meanings. An all-1s address could be taken to mean an addressing of all stations on the network, so sending to this address would result in a broadcast on the local network. The rules describing the meanings of the address value are collectively called an addressing scheme.[41]
Address mapping
Sometimes protocols need to map addresses of one scheme on addresses of another scheme. For instance, to translate a logical IP address specified by the application to an Ethernet MAC address. This is referred to as address mapping.[42]
Routing
When systems are not directly connected, intermediary systems along the route to the intended receiver(s) need to forward messages on behalf of the sender. On the Internet, the networks are connected using routers. The interconnection of networks through routers is called internetworking.
Detection of transmission errors
Error detection is necessary on networks where data corruption is possible. In a common approach, a CRC of the data area is added to the end of packets, making it possible for the receiver to detect differences caused by corruption. The receiver rejects the packets on CRC differences and arranges somehow for retransmission.[43]
Acknowledgements
Acknowledgement of correct reception of packets is required for connection-oriented communication. Acknowledgments are sent from receivers back to their respective senders.[44]
Loss of information - timeouts and retries
Packets may be lost on the network or be delayed in transit. To cope with this, under some protocols, a sender may expect an acknowledgment of correct reception from the receiver within a certain amount of time. Thus, on timeouts, the sender may need to retransmit the information.[a] In case of a permanently broken link, the retransmission has no effect, so the number of retransmissions is limited. Exceeding the retry limit is considered an error.[45]
Direction of information flow
Direction needs to be addressed if transmissions can only occur in one direction at a time as on half-duplex links or from one sender at a time as on a shared medium. This is known as media access control. Arrangements have to be made to accommodate the case of collision or contention where two parties respectively simultaneously transmit or wish to transmit.[46]
Sequence control
If long bitstrings are divided into pieces and then sent on the network individually, the pieces may get lost or delayed or, on some types of networks, take different routes to their destination. As a result, pieces may arrive out of sequence. Retransmissions can result in duplicate pieces. By marking the pieces with sequence information at the sender, the receiver can determine what was lost or duplicated, ask for necessary retransmissions and reassemble the original message.[47]
Flow control
Flow control is needed when the sender transmits faster than the receiver or intermediate network equipment can process the transmissions. Flow control can be implemented by messaging from receiver to sender.[48]
Queueing
Communicating processes or state machines employ queues (or "buffers"), usually FIFO queues, to deal with the messages in the order sent, and may sometimes have multiple queues with different prioritization.

Protocol design

[edit]

Systems engineering principles have been applied to create a set of common network protocol design principles. The design of complex protocols often involves decomposition into simpler, cooperating protocols. Such a set of cooperating protocols is sometimes called a protocol family or a protocol suite,[32] within a conceptual framework.

Communicating systems operate concurrently. An important aspect of concurrent programming is the synchronization of software for receiving and transmitting messages of communication in proper sequencing. Concurrent programming has traditionally been a topic in operating systems theory texts.[49] Formal verification seems indispensable because concurrent programs are notorious for the hidden and sophisticated bugs they contain.[50] A mathematical approach to the study of concurrency and communication is referred to as communicating sequential processes (CSP).[51] Concurrency can also be modeled using finite-state machines, such as Mealy and Moore machines. Mealy and Moore machines are in use as design tools in digital electronics systems encountered in the form of hardware used in telecommunication or electronic devices in general.[52][better source needed]

The literature presents numerous analogies between computer communication and programming. In analogy, a transfer mechanism of a protocol is comparable to a central processing unit (CPU). The framework introduces rules that allow the programmer to design cooperating protocols independently of one another.

Layering

[edit]
Figure 2. Protocols in relation to the Internet layering scheme.
The TCP/IP model or Internet layering scheme and its relation to some common protocols.

In modern protocol design, protocols are layered to form a protocol stack. Layering is a design principle that divides the protocol design task into smaller steps, each of which accomplishes a specific part, interacting with the other parts of the protocol only in a small number of well-defined ways. Layering allows the parts of a protocol to be designed and tested without a combinatorial explosion of cases, keeping each design relatively simple.

The communication protocols in use on the Internet are designed to function in diverse and complex settings. Internet protocols are designed for simplicity and modularity and fit into a coarse hierarchy of functional layers defined in the Internet Protocol Suite.[53] The first two cooperating protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP) resulted from the decomposition of the original Transmission Control Program, a monolithic communication protocol, into this layered communication suite.

The OSI model was developed internationally based on experience with networks that predated the internet as a reference model for general communication with much stricter rules of protocol interaction and rigorous layering.

Typically, application software is built upon a robust data transport layer. Underlying this transport layer is a datagram delivery and routing mechanism that is typically connectionless in the Internet. Packet relaying across networks happens over another layer that involves only network link technologies, which are often specific to certain physical layer technologies, such as Ethernet. Layering provides opportunities to exchange technologies when needed, for example, protocols are often stacked in a tunneling arrangement to accommodate the connection of dissimilar networks. For example, IP may be tunneled across an Asynchronous Transfer Mode (ATM) network.

Protocol layering

[edit]
Figure 3. Message flows using a protocol suite.
Figure 3. Message flows using a protocol suite. Black loops show the actual messaging loops, red loops are the effective communication between layers enabled by the lower layers.

Protocol layering forms the basis of protocol design.[31] It allows the decomposition of single, complex protocols into simpler, cooperating protocols.[53] The protocol layers each solve a distinct class of communication problems. Together, the layers make up a layering scheme or model.

Computations deal with algorithms and data; Communication involves protocols and messages; So the analog of a data flow diagram is some kind of message flow diagram.[4] To visualize protocol layering and protocol suites, a diagram of the message flows in and between two systems, A and B, is shown in figure 3. The systems, A and B, both make use of the same protocol suite. The vertical flows (and protocols) are in-system and the horizontal message flows (and protocols) are between systems. The message flows are governed by rules, and data formats specified by protocols. The blue lines mark the boundaries of the (horizontal) protocol layers.

Software layering

[edit]
Figure 5: Protocol and software layering. The software modules implementing the protocols are represented by cubes. The information flow between the modules is represented by arrows. The (top two horizontal) red arrows are virtual. The blue lines mark the layer boundaries.

The software supporting protocols has a layered organization and its relationship with protocol layering is shown in figure 5.

To send a message on system A, the top-layer software module interacts with the module directly below it and hands over the message to be encapsulated. The lower module fills in the header data in accordance with the protocol it implements and interacts with the bottom module which sends the message over the communications channel to the bottom module of system B. On the receiving system B the reverse happens, so ultimately the message gets delivered in its original form to the top module of system B.[54]

Program translation is divided into subproblems. As a result, the translation software is layered as well, allowing the software layers to be designed independently. The same approach can be seen in the TCP/IP layering.[55]

The modules below the application layer are generally considered part of the operating system. Passing data between these modules is much less expensive than passing data between an application program and the transport layer. The boundary between the application layer and the transport layer is called the operating system boundary.[56]

Strict layering

[edit]

Strictly adhering to a layered model, a practice known as strict layering, is not always the best approach to networking.[57] Strict layering can have a negative impact on the performance of an implementation.[58]

Although the use of protocol layering is today ubiquitous across the field of computer networking, it has been historically criticized by many researchers[59] as abstracting the protocol stack in this way may cause a higher layer to duplicate the functionality of a lower layer, a prime example being error recovery on both a per-link basis and an end-to-end basis.[60]

Design patterns

[edit]

Commonly recurring problems in the design and implementation of communication protocols can be addressed by software design patterns.[61][62][63][64][65]

Formal specification

[edit]

Popular formal methods of describing communication syntax are Abstract Syntax Notation One (an ISO standard) and augmented Backus–Naur form (an IETF standard).

Finite-state machine models are used to formally describe the possible interactions of the protocol.[66][67] and communicating finite-state machines[68]

Protocol development

[edit]

For communication to occur, protocols have to be selected. The rules can be expressed by algorithms and data structures. Hardware and operating system independence is enhanced by expressing the algorithms in a portable programming language. Source independence of the specification provides wider interoperability.

Protocol standards are commonly created by obtaining the approval or support of a standards organization, which initiates the standardization process. The members of the standards organization agree to adhere to the work result on a voluntary basis. Often the members are in control of large market shares relevant to the protocol and in many cases, standards are enforced by law or the government because they are thought to serve an important public interest, so getting approval can be very important for the protocol.

The need for protocol standards

[edit]

The need for protocol standards can be shown by looking at what happened to the Binary Synchronous Communications (BSC) protocol invented by IBM. BSC is an early link-level protocol used to connect two separate nodes. It was originally not intended to be used in a multinode network, but doing so revealed several deficiencies of the protocol. In the absence of standardization, manufacturers and organizations felt free to enhance the protocol, creating incompatible versions on their networks. In some cases, this was deliberately done to discourage users from using equipment from other manufacturers. There are more than 50 variants of the original bi-sync protocol. One can assume, that a standard would have prevented at least some of this from happening.[29]

In some cases, protocols gain market dominance without going through a standardization process. Such protocols are referred to as de facto standards. De facto standards are common in emerging markets, niche markets, or markets that are monopolized (or oligopolized). They can hold a market in a very negative grip, especially when used to scare away competition. From a historical perspective, standardization should be seen as a measure to counteract the ill-effects of de facto standards. Positive exceptions exist; a de facto standard operating system like Linux does not have this negative grip on its market, because the sources are published and maintained in an open way, thus inviting competition.

Standards organizations

[edit]

Some of the standards organizations of relevance for communication protocols are the International Organization for Standardization (ISO), the International Telecommunication Union (ITU), the Institute of Electrical and Electronics Engineers (IEEE), and the Internet Engineering Task Force (IETF). The IETF maintains the protocols in use on the Internet. The IEEE controls many software and hardware protocols in the electronics industry for commercial and consumer devices. The ITU is an umbrella organization of telecommunication engineers designing the public switched telephone network (PSTN), as well as many radio communication systems. For marine electronics the NMEA standards are used. The World Wide Web Consortium (W3C) produces protocols and standards for Web technologies.

International standards organizations are supposed to be more impartial than local organizations with a national or commercial self-interest to consider. Standards organizations also do research and development for standards of the future. In practice, the standards organizations mentioned, cooperate closely with each other.[69]

Multiple standards bodies may be involved in the development of a protocol. If they are uncoordinated, then the result may be multiple, incompatible definitions of a protocol, or multiple, incompatible interpretations of messages; important invariants in one definition (e.g., that time-to-live values are monotone decreasing to prevent stable routing loops) may not be respected in another.[70]

The standardization process

[edit]

In the ISO, the standardization process starts off with the commissioning of a sub-committee workgroup. The workgroup issues working drafts and discussion documents to interested parties (including other standards bodies) in order to provoke discussion and comments. This will generate a lot of questions, much discussion and usually some disagreement. These comments are taken into account and a draft proposal is produced by the working group. After feedback, modification, and compromise the proposal reaches the status of a draft international standard, and ultimately an international standard. International standards are reissued periodically to handle the deficiencies and reflect changing views on the subject.[71]

OSI standardization

[edit]

A lesson learned from ARPANET, the predecessor of the Internet, was that protocols need a framework to operate. It is therefore important to develop a general-purpose, future-proof framework suitable for structured protocols (such as layered protocols) and their standardization. This would prevent protocol standards with overlapping functionality and would allow clear definition of the responsibilities of a protocol at the different levels (layers).[73] This gave rise to the Open Systems Interconnection model (OSI model), which is used as a framework for the design of standard protocols and services conforming to the various layer specifications.[74]

In the OSI model, communicating systems are assumed to be connected by an underlying physical medium providing a basic transmission mechanism. The layers above it are numbered. Each layer provides service to the layer above it using the services of the layer immediately below it. The top layer provides services to the application process. The layers communicate with each other by means of an interface, called a service access point. Corresponding layers at each system are called peer entities. To communicate, two peer entities at a given layer use a protocol specific to that layer which is implemented by using services of the layer below.[75] For each layer, there are two types of standards: protocol standards defining how peer entities at a given layer communicate, and service standards defining how a given layer communicates with the layer above it.

In the OSI model, the layers and their functionality are (from highest to lowest layer):

  • The Application layer may provide the following services to the application processes: identification of the intended communication partners, establishment of the necessary authority to communicate, determination of availability and authentication of the partners, agreement on privacy mechanisms for the communication, agreement on responsibility for error recovery and procedures for ensuring data integrity, synchronization between cooperating application processes, identification of any constraints on syntax (e.g. character sets and data structures), determination of cost and acceptable quality of service, selection of the dialogue discipline, including required logon and logoff procedures.[76]
  • The presentation layer may provide the following services to the application layer: a request for the establishment of a session, data transfer, negotiation of the syntax to be used between the application layers, any necessary syntax transformations, formatting and special purpose transformations (e.g., data compression and data encryption).[77]
  • The session layer may provide the following services to the presentation layer: establishment and release of session connections, normal and expedited data exchange, a quarantine service which allows the sending presentation entity to instruct the receiving session entity not to release data to its presentation entity without permission, interaction management so presentation entities can control whose turn it is to perform certain control functions, resynchronization of a session connection, reporting of unrecoverable exceptions to the presentation entity.[78]
  • The transport layer provides reliable and transparent data transfer in a cost-effective way as required by the selected quality of service. It may support the multiplexing of several transport connections on to one network connection or split one transport connection into several network connections.[79]
  • The network layer does the setup, maintenance and release of network paths between transport peer entities. When relays are needed, routing and relay functions are provided by this layer. The quality of service is negotiated between network and transport entities at the time the connection is set up. This layer is also responsible for network congestion control.[80]
  • The data link layer does the setup, maintenance and release of data link connections. Errors occurring in the physical layer are detected and may be corrected. Errors are reported to the network layer. The exchange of data link units (including flow control) is defined by this layer.[81]
  • The physical layer describes details like the electrical characteristics of the physical connection, the transmission techniques used, and the setup, maintenance and clearing of physical connections.[82]

In contrast to the TCP/IP layering scheme, which assumes a connectionless network, RM/OSI assumed a connection-oriented network.[83] Connection-oriented networks are more suitable for wide area networks and connectionless networks are more suitable for local area networks. Connection-oriented communication requires some form of session and (virtual) circuits, hence the (in the TCP/IP model lacking) session layer. The constituent members of ISO were mostly concerned with wide area networks, so the development of RM/OSI concentrated on connection-oriented networks and connectionless networks were first mentioned in an addendum to RM/OSI[84][85] and later incorporated into an update to RM/OSI.[86]

At the time,[when?] the IETF had to cope with this and the fact that the Internet needed protocols that simply were not there.[citation needed] As a result, the IETF developed its own standardization process based on "rough consensus and running code".[87] The standardization process is described by RFC 2026.

Nowadays, the IETF has become a standards organization for the protocols in use on the Internet. RM/OSI has extended its model to include connectionless services and because of this, both TCP and IP could be developed into international standards.[citation needed]

Wire image

[edit]

The wire image of a protocol is the information that a non-participant observer is able to glean from observing the protocol messages, including both information explicitly given meaning by the protocol, but also inferences made by the observer.[88] Unencrypted protocol metadata is one source making up the wire image, and side-channels including packet timing also contribute.[89] Different observers with different vantages may see different wire images.[90] The wire image is relevant to end-user privacy and the extensibility of the protocol.[91]

If some portion of the wire image is not cryptographically authenticated, it is subject to modification by intermediate parties (i.e., middleboxes), which can influence protocol operation.[89] Even if authenticated, if a portion is not encrypted, it will form part of the wire image, and intermediate parties may intervene depending on its content (e.g., dropping packets with particular flags). Signals deliberately intended for intermediary consumption may be left authenticated but unencrypted.[92]

The wire image can be deliberately engineered, encrypting parts that intermediaries should not be able to observe and providing signals for what they should be able to.[93] If provided signals are decoupled from the protocol's operation, they may become untrustworthy.[94] Benign network management and research are affected by metadata encryption; protocol designers must balance observability for operability and research against ossification resistance and end-user privacy.[91] The IETF announced in 2014 that it had determined that large-scale surveillance of protocol operations is an attack due to the ability to infer information from the wire image about users and their behaviour,[95] and that the IETF would "work to mitigate pervasive monitoring" in its protocol designs;[96] this had not been done systematically previously.[96] The Internet Architecture Board recommended in 2023 that disclosure of information by a protocol to the network should be intentional,[97] performed with the agreement of both recipient and sender,[98] authenticated to the degree possible and necessary,[99] only acted upon to the degree of its trustworthiness,[100] and minimised and provided to a minimum number of entities.[101][102] Engineering the wire image and controlling what signals are provided to network elements was a "developing field" in 2023, according to the IAB.[103]

Ossification

[edit]

Protocol ossification is the loss of flexibility, extensibility and evolvability of network protocols. This is largely due to middleboxes that are sensitive to the wire image of the protocol, and which can interrupt or interfere with messages that are valid but which the middlebox does not correctly recognize.[104] This is a violation of the end-to-end principle.[105] Secondary causes include inflexibility in endpoint implementations of protocols.[106]

Ossification is a major issue in Internet protocol design and deployment, as it can prevent new protocols or extensions from being deployed on the Internet, or place strictures on the design of new protocols; new protocols may have to be encapsulated in an already-deployed protocol or mimic the wire image of another protocol.[107] Because of ossification, the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are the only practical choices for transport protocols on the Internet,[108] and TCP itself has significantly ossified, making extension or modification of the protocol difficult.[109]

Recommended methods of preventing ossification include encrypting protocol metadata,[110] and ensuring that extension points are exercised and wire image variability is exhibited as fully as possible;[111] remedying existing ossification requires coordination across protocol participants.[112] QUIC is the first IETF transport protocol to have been designed with deliberate anti-ossification properties.[88]

Taxonomies

[edit]

Classification schemes for protocols usually focus on the domain of use and function. As an example of domain of use, connection-oriented protocols and connectionless protocols are used on connection-oriented networks and connectionless networks respectively. An example of function is a tunneling protocol, which is used to encapsulate packets in a high-level protocol so that the packets can be passed across a transport system using the high-level protocol.

A layering scheme combines both function and domain of use. The dominant layering schemes are the ones developed by the IETF and by ISO. Despite the fact that the underlying assumptions of the layering schemes are different enough to warrant distinguishing the two, it is a common practice to compare the two by relating common protocols to the layers of the two schemes.[113] The layering scheme from the IETF is called Internet layering or TCP/IP layering. The layering scheme from ISO is called the OSI model or ISO layering.

In networking equipment configuration, a term-of-art distinction is often drawn: The term protocol strictly refers to the transport layer, and the term service refers to protocols utilizing a protocol for transport. In the common case of TCP and UDP, services are distinguished by port numbers. Conformance to these port numbers is voluntary, so in content inspection systems the term service strictly refers to port numbers, and the term application is often used to refer to protocols identified through inspection signatures.

See also

[edit]

Notes

[edit]
  1. ^ Failure to receive an acknowledgment indicates that either the original transmission or the acknowledgment was lost. The sender has no means to distinguish these cases and therefore, to ensure all data is received, must make the conservative assumption that the original transmission was lost.

References

[edit]
  1. ^ US 7529565, Hilpisch, Robert E.; Duchscher, Rob & Seel, Mark et al., "Wireless communication protocol", published 5 May 2009, assigned to Starkey Laboratories Inc. and Oticon AS 
  2. ^ Protocol, Encyclop?dia Britannica, archived from the original on 12 September 2012, retrieved 24 September 2012
  3. ^ a b Comer 2000, Sect. 11.2 - The Need For Multiple Protocols, p. 177, "They (protocols) are to communication what programming languages are to computation"
  4. ^ a b c Comer 2000, Sect. 1.3 - Internet Services, p. 3, "Protocols are to communication what algorithms are to computation"
  5. ^ Naughton, John (24 September 2015). A Brief History of the Future. Orion. ISBN 978-1-4746-0277-8.
  6. ^ Campbell-Kelly, Martin (July 1987). "Data Communications at the National Physical Laboratory (1965-1975)". IEEE Annals of the History of Computing. 9 (3): 221–247. doi:10.1109/MAHC.1987.10023.
  7. ^ Pelkey, James L. "6.1 The Communications Subnet: BBN 1969". Entrepreneurial Capitalism and Innovation: A History of Computer Communications 1968–1988. As Kahn recalls: ... Paul Baran's contributions ... I also think Paul was motivated almost entirely by voice considerations. If you look at what he wrote, he was talking about switches that were low-cost electronics. The idea of putting powerful computers in these locations hadn't quite occurred to him as being cost effective. So the idea of computer switches was missing. The whole notion of protocols didn't exist at that time. And the idea of computer-to-computer communications was really a secondary concern.
  8. ^ Waldrop, M. Mitchell (2018). The Dream Machine. Stripe Press. p. 286. ISBN 978-1-953953-36-0. Baran had put more emphasis on digital voice communications than on computer communications.
  9. ^ Kleinrock, L. (1978). "Principles and lessons in packet communications". Proceedings of the IEEE. 66 (11): 1320–1329. doi:10.1109/PROC.1978.11143. Paul Baran ... focused on the routing procedures and on the survivability of distributed communication systems in a hostile environment, but did not concentrate on the need for resource sharing in its form as we now understand it; indeed, the concept of a software switch was not present in his work.
  10. ^ Interface Message Processor: Specifications for the Interconnection of a Host and an IMP (PDF) (Report). Bolt Beranek and Newman (BBN). Report No. 1822.
  11. ^ BOOKS, HIGH DEFINITION. UGC -NET/JRF/SET PTP & Guide Teaching and Research Aptitude: UGC -NET By HD. High Definition Books.
  12. ^ "NCP – Network Control Program". Living Internet. Archived from the original on 7 August 2022. Retrieved 8 October 2022.
  13. ^ Bennett, Richard (September 2009). "Designed for Change: End-to-End Arguments, Internet Innovation, and the Net Neutrality Debate" (PDF). Information Technology and Innovation Foundation. pp. 7, 11. Retrieved 11 September 2017.
  14. ^ Abbate, Janet (2000). Inventing the Internet. MIT Press. pp. 124–127. ISBN 978-0-262-51115-5. In fact, CYCLADES, unlike ARPANET, had been explicitly designed to facilitate internetworking; it could, for instance, handle varying formats and varying levels of service
  15. ^ Kim, Byung-Keun (2005). Internationalising the Internet the Co-evolution of Influence and Technology. Edward Elgar. pp. 51–55. ISBN 1845426754. In addition to the NPL Network and the ARPANET, CYCLADES, an academic and research experimental network, also played an important role in the development of computer networking technologies
  16. ^ "The internet's fifth man". The Economist. 30 November 2013. Retrieved 22 April 2020. In the early 1970s Mr Pouzin created an innovative data network that linked locations in France, Italy and Britain. Its simplicity and efficiency pointed the way to a network that could connect not just dozens of machines, but millions of them. It captured the imagination of Dr Cerf and Dr Kahn, who included aspects of its design in the protocols that now power the internet.
  17. ^ Moschovitis 1999, p. 78-9
  18. ^ Cerf, V.; Kahn, R. (May 1974). "A Protocol for Packet Network Intercommunication". IEEE Transactions on Communications. 22 (5): 637–648. doi:10.1109/TCOM.1974.1092259. The authors wish to thank a number of colleagues for helpful comments during early discussions of international network protocols, especially R. Metcalfe, R. Scantlebury, D. Walden, and H. Zimmerman; D. Davies and L. Pouzin who constructively commented on the fragmentation and accounting issues; and S. Crocker who commented on the creation and destruction of associations.
  19. ^ McKenzie, Alexander (January 2011). "INWG and the Conception of the Internet: An Eyewitness Account". IEEE Annals of the History of Computing. 33 (1): 66–71. Bibcode:2011IAHC...33a..66M. doi:10.1109/MAHC.2011.9.
  20. ^ Schwartz, Mischa (November 2010). "X.25 Virtual Circuits - TRANSPAC IN France - Pre-Internet Data Networking [History of communications]". IEEE Communications Magazine. 48 (11): 40–46. doi:10.1109/MCOM.2010.5621965.
  21. ^ Rybczynski, Tony (December 2009). "Commercialization of packet switching (1975-1985): A Canadian perspective [History of Communications]". IEEE Communications Magazine. 47 (12): 26–31. doi:10.1109/MCOM.2009.5350364.
  22. ^ The "Hidden" Prehistory of European Research Networking. Trafford Publishing. p. 354. ISBN 978-1-4669-3935-6.
  23. ^ "TCP/IP Internet Protocol". Living Internet. Archived from the original on 1 September 2022. Retrieved 8 October 2022.
  24. ^ Andrew L. Russell (30 July 2013). "OSI: The Internet That Wasn't". IEEE Spectrum. Vol. 50, no. 8.
  25. ^ Russell, Andrew L. "Rough Consensus and Running Code' and the Internet-OSI Standards War" (PDF). IEEE Annals of the History of Computing. Archived (PDF) from the original on 17 November 2019. Retrieved 23 February 2020.
  26. ^ "Standards Wars" (PDF). 2006. Archived (PDF) from the original on 24 February 2021. Retrieved 23 February 2020.
  27. ^ Ben-Ari 1982, chapter 2 - The concurrent programming abstraction, p. 18-19, states the same.
  28. ^ Ben-Ari 1982, Section 2.7 - Summary, p. 27, summarizes the concurrent programming abstraction.
  29. ^ a b Marsden 1986, Section 6.1 - Why are standards necessary?, p. 64-65, uses BSC as an example to show the need for both standard protocols and a standard framework.
  30. ^ Comer 2000, Sect. 11.2 - The Need For Multiple Protocols, p. 177, explains this by drawing analogies between computer communication and programming languages.
  31. ^ a b Sect. 11.10 - The Disadvantage Of Layering, p. 192, states: layering forms the basis for protocol design.
  32. ^ a b Comer 2000, Sect. 11.2 - The Need For Multiple Protocols, p. 177, states the same.
  33. ^ Comer 2000, Sect. 11.3 - The Conceptual Layers Of Protocol Software, p. 178, "Each layer takes responsibility for handling one part of the problem."
  34. ^ Comer 2000, Sect. 11.11 - The Basic Idea Behind Multiplexing And Demultiplexing, p. 192, states the same.
  35. ^ Kirch, Olaf (16 January 2002). "Text Based Protocols". Archived from the original on 30 May 2010. Retrieved 21 October 2014.
  36. ^ Kirch, Olaf (16 January 2002). "Binary Representation Protocols". Archived from the original on 30 May 2010. Retrieved 4 May 2006.
  37. ^ Kirch, Olaf (16 January 2002). "Binary Representation Protocols". Archived from the original on 5 March 2006. Retrieved 4 May 2006.
  38. ^ "Welcome To UML Web Site!". Uml.org. Archived from the original on 30 September 2019. Retrieved 15 January 2017.
  39. ^ Marsden 1986, Chapter 3 - Fundamental protocol concepts and problem areas, p. 26-42, explains much of the following.
  40. ^ Comer 2000, Sect. 7.7.4 - Datagram Size, Network MTU, and Fragmentation, p. 104, Explains fragmentation and the effect on the header of the fragments.
  41. ^ Comer 2000, Chapter 4 - Classful Internet Addresses, p. 64-67;71.
  42. ^ Marsden 1986, Section 14.3 - Layering concepts and general definitions, p. 187, explains address mapping.
  43. ^ Marsden 1986, Section 3.2 - Detection and transmission errors, p. 27, explains the advantages of backward error correction.
  44. ^ Marsden 1986, Section 3.3 - Acknowledgement, p. 28-33, explains the advantages of positive only acknowledgment and mentions datagram protocols as exceptions.
  45. ^ Marsden 1986, Section 3.4 - Loss of information - timeouts and retries, p. 33-34.
  46. ^ Marsden 1986, Section 3.5 - Direction of information flow, p. 34-35, explains master/slave and the negotiations to gain control.
  47. ^ Marsden 1986, Section 3.6 - Sequence control, p. 35-36, explains how packets get lost and how sequencing solves this.
  48. ^ Marsden 1986, Section 3.7 - Flow control, p. 36-38.
  49. ^ Ben-Ari 1982, in his preface, p. xiii.
  50. ^ Ben-Ari 1982, in his preface, p. xiv.
  51. ^ Hoare 1985, Chapter 4 - Communication, p. 133, deals with communication.
  52. ^ S. Srinivasan, Digital Circuits and Systems, NPTEL courses, archived from the original on 27 December 2009
  53. ^ a b Comer 2000, Sect. 11.2 - The Need For Multiple Protocols, p. 177, introduces the decomposition in layers.
  54. ^ Comer 2000, Sect. 11.3 - The Conceptual Layers Of Protocol Software, p. 179, the first two paragraphs describe the sending of a message through successive layers.
  55. ^ Comer 2000, Sect. 11.2 - The need for multiple protocols, p. 178, explains similarities protocol software and compiler, assembler, linker, loader.
  56. ^ Comer 2000, Sect. 11.9.1 - Operating System Boundary, p. 192, describes the operating system boundary.
  57. ^ IETF 1989, Sect 1.3.1 - Organization, p. 15, 2nd paragraph: many design choices involve creative "breaking" of strict layering.
  58. ^ Comer 2000, Sect. 11.10 - The Disadvantage Of Layering, p. 192, explains why "strict layering can be extremely inefficient" giving examples of optimizations.
  59. ^ Wakeman, I (January 1992). "Layering considered harmful". IEEE Network: 20–24.
  60. ^ Kurose, James; Ross, Keith (2005). Computer Networking: A Top-Down Approach. Pearson.
  61. ^ Lascano, Jorge Edison; Clyde, Stephen; Raza, Ali. "Communication-protocol Design Patterns (CommDP) - COMMDP". Archived from the original on 18 March 2017. Retrieved 17 March 2017.
  62. ^ Lascano, J. E.; Clyde, S. (2016). A Pattern Language for Application-level Communication Protocols. ICSEA 2016, The Eleventh International Conference on Software Engineering Advances. pp. 22–30.
  63. ^ Daigneau, R. (2011). Service Design Patterns: Fundamental Design Solutions for SOAP/WSDL and RESTful Web Services (1 ed.). Upper Saddle River, NJ: Addison-Wesley Professional.
  64. ^ Fowler, M. (2002). Patterns of Enterprise Application Architecture (1 ed.). Boston: Addison-Wesley Professional. ISBN 0-321-12742-0.
  65. ^ [1]F. Buschmann, K. Henney, and D. C. Schmidt, Pattern-Oriented Software Architecture Volume 4: A Pattern Language for Distributed Computing, Volume 4 edition. Chichester England; New York: Wiley, 2007.
  66. ^ Bochmann, G. (1978). "Finite state description of communication protocols". Computer Networks. 2 (4–5): 361–372. doi:10.1016/0376-5075(78)90015-6.
  67. ^ Comer 2000, Glossary of Internetworking Terms and Abbreviations, p. 704, term protocol.
  68. ^ Brand, Daniel; Zafiropulo, Pitro (April 1983). "On Communicating Finite-State Machines". Journal of the ACM. 30 (2): 323–342. doi:10.1145/322374.322380.
  69. ^ Marsden 1986, Section 6.3 - Advantages of standardization, p. 66-67, states the same.
  70. ^ Bryant & Morrow 2009, p. 4.
  71. ^ Marsden 1986, Section 6.4 - Some problems with standardisation, p. 67, follows HDLC to illustrate the process.
  72. ^ "X.225 : Information technology – Open Systems Interconnection – Connection-oriented Session protocol: Protocol specification". Archived from the original on 1 February 2021. Retrieved 10 March 2023.
  73. ^ Marsden 1986, Section 6.1 - Why are standards necessary?, p. 65, explains lessons learned from ARPANET.
  74. ^ Marsden 1986, Section 14.1 - Introduction, p. 181, introduces OSI.
  75. ^ Marsden 1986, Section 14.3 - Layering concepts and general definitions, p. 183-185, explains terminology.
  76. ^ Marsden 1986, Section 14.4 - The application layer, p. 188, explains this.
  77. ^ Marsden 1986, Section 14.5 - The presentation layer, p. 189, explains this.
  78. ^ Marsden 1986, Section 14.6 - The session layer, p. 190, explains this.
  79. ^ Marsden 1986, Section 14.7 - The transport layer, p. 191, explains this.
  80. ^ Marsden 1986, Section 14.8 - The network layer, p. 192, explains this.
  81. ^ Marsden 1986, Section 14.9 - The data link layer, p. 194, explains this.
  82. ^ Marsden 1986, Section 14.10 - The physical layer, p. 195, explains this.
  83. ^ ISO 7498:1984 – Information processing systems - Open Systems Interconnection - Basic Reference Model. p. 5. This Basic Reference Model of Open Systems Interconnection is based on the assumption that a connection is required for the transfer of data.
  84. ^ ISO 7498:1984/ADD 1:1987 – Information processing systems — Open Systems Interconnection — Basic Reference Model — Addendum 1.
  85. ^ Marsden 1986, Section 14.11 - Connectionless mode and RM/OSI, p. 195, mentions this.
  86. ^ ISO 7498:1994 – Information processing systems - Open Systems Interconnection - Basic Reference Model.
  87. ^ Comer 2000, Section 1.9 - Internet Protocols And Standardization, p. 12, explains why the IETF did not use existing protocols.
  88. ^ a b Trammell & Kuehlewind 2019, p. 2.
  89. ^ a b Trammell & Kuehlewind 2019, p. 3.
  90. ^ Trammell & Kuehlewind 2019, p. 4.
  91. ^ a b Fairhurst & Perkins 2021, 7. Conclusions.
  92. ^ Trammell & Kuehlewind 2019, p. 5.
  93. ^ Trammell & Kuehlewind 2019, p. 6.
  94. ^ Trammell & Kuehlewind 2019, p. 7-8.
  95. ^ Farrell & Tschofenig 2014, p. 2.
  96. ^ a b Farrell & Tschofenig 2014, p. 3.
  97. ^ Arkko et al. 2023, 2.1. Intentional Distribution.
  98. ^ Arkko et al. 2023, 2.2. Control of the Distribution of Information.
  99. ^ Arkko et al. 2023, 2.3. Protecting Information and Authentication.
  100. ^ Arkko et al. 2023, 2.5. Limiting Impact of Information.
  101. ^ Arkko et al. 2023, 2.4. Minimize Information.
  102. ^ Arkko et al. 2023, 2.6. Minimum Set of Entities.
  103. ^ Arkko et al. 2023, 3. Further Work.
  104. ^ Papastergiou et al. 2017, p. 619.
  105. ^ Papastergiou et al. 2017, p. 620.
  106. ^ Papastergiou et al. 2017, p. 620-621.
  107. ^ Papastergiou et al. 2017, p. 623-4.
  108. ^ McQuistin, Perkins & Fayed 2016, p. 1.
  109. ^ Thomson & Pauly 2021, A.5. TCP.
  110. ^ Hardie 2019, p. 7-8.
  111. ^ Thomson & Pauly 2021, 3. Active Use.
  112. ^ Thomson & Pauly 2021, 3.5. Restoring Active Use.
  113. ^ Comer 2000, Sect. 11.5.1 - The TCP/IP 5-Layer Reference Model, p. 183, states the same.

Bibliography

[edit]
[edit]
爱长闭口用什么护肤品 手掌发红是什么病 竹鼠吃什么 梦见自己拉了好多屎是什么意思 佝偻病是缺什么
东窗事发是什么意思 尿道痒痒是什么原因 入木三分什么意思 欺山莫欺水是什么意思 汗疱疹是什么
什么海没有边 扁平化管理是什么意思 男男叫什么 睡觉时间长是什么原因 什么办法退烧快
行代表什么生肖 婴儿便秘怎么办什么方法最有效 6月5号是什么星座的 木乐读什么 丙肝为什么会自愈
白玫瑰代表什么意思cl108k.com 血小板低会出现什么症状hcv7jop5ns6r.cn 未必是什么意思hcv7jop5ns4r.cn 病毒感染发烧吃什么药hcv8jop2ns5r.cn 棚户区改造和拆迁有什么区别hcv8jop5ns8r.cn
非萎缩性胃窦炎是什么意思hcv9jop3ns2r.cn 为什么会有阴虱子hcv8jop0ns6r.cn 手心发黄是什么原因hcv9jop3ns7r.cn 什么是主动脉夹层hcv9jop5ns9r.cn 摇篮是什么意思hcv9jop3ns2r.cn
新生儿贫血是什么原因造成的hcv7jop9ns3r.cn 百香果配什么好喝hcv9jop2ns8r.cn 十月十三是什么星座hcv8jop8ns2r.cn 什么动物有三个心脏hcv8jop2ns3r.cn 雷锋属什么生肖hcv9jop1ns0r.cn
端着是什么意思sanhestory.com 额头上长痘是因为什么hcv9jop4ns0r.cn 掉头发是什么原因导致的hcv8jop8ns7r.cn 联字五行属什么hcv9jop4ns7r.cn 头热手脚冰凉什么原因hcv8jop4ns6r.cn
百度