Network Protocols
Comprehensive collection of 78+ essential network protocols covering all OSI layers from physical to application layer communications.
HTTP (HyperText Transfer Protocol)
Application layer protocol for transmitting hypertext documents between web servers and clients.
Standard
How Used
Security
Where Used
- Web browsing
- RESTful APIs
- Web services
- Content delivery
Example Usage
Key Characteristics
Stateless protocol Request-response model Text-based headers Supports multiple methods (GET, POST, PUT, DELETE)HTTPS (HTTP Secure)
Secure version of HTTP using TLS/SSL encryption for secure web communication.
Standard
How Used
Security
Where Used
- Secure web browsing
- E-commerce transactions
- Online banking
- Secure API communications
Example Usage
Key Characteristics
Encrypted data transmission Server authentication Data integrity Perfect Forward Secrecy (PFS)TCP (Transmission Control Protocol)
Reliable, connection-oriented transport protocol ensuring ordered and error-checked data delivery.
Standard
How Used
Security
Where Used
- Web browsing (HTTP/HTTPS)
- Email (SMTP, IMAP, POP3)
- File transfer (FTP, SFTP)
- Remote access (SSH, Telnet)
Example Usage
Key Characteristics
Connection-oriented Reliable delivery Flow control Congestion controlUDP (User Datagram Protocol)
Fast, connectionless transport protocol for applications requiring speed over reliability.
Standard
How Used
Security
Where Used
- DNS queries
- Video streaming (RTSP)
- Online gaming
- VPN tunneling
- DHCP
Example Usage
Key Characteristics
Connectionless Low overhead No delivery guarantee Fast transmissionIP (Internet Protocol)
Network layer protocol responsible for routing packets across interconnected networks.
Standard
How Used
Security
Where Used
- Internet routing
- LAN/WAN communication
- VPN connections
- All TCP/UDP communications
Example Usage
Key Characteristics
Connectionless Best-effort delivery Hierarchical addressing Fragmentation supportDNS (Domain Name System)
Hierarchical naming system that translates human-readable domain names to IP addresses.
Standard
How Used
Security
Where Used
- Web browsing
- Email routing
- Service discovery
- Load balancing
Example Usage
Key Characteristics
Hierarchical structure Distributed database Caching mechanism Multiple record typesDHCP (Dynamic Host Configuration Protocol)
Network service that automatically assigns IP addresses and network configuration to devices.
Standard
How Used
Security
Where Used
- Home networks
- Corporate LANs
- WiFi networks
- Mobile device connectivity
Example Usage
Key Characteristics
Automatic IP assignment Lease-based allocation Configuration distribution Address pool managementFTP (File Transfer Protocol)
Application protocol for transferring files between computers over a network.
Standard
How Used
Security
Where Used
- Website file uploads
- Software distribution
- Backup systems
- Content management
Example Usage
Key Characteristics
Two-channel protocol Active/passive modes ASCII and binary transfer Directory navigationSSH (Secure Shell)
Cryptographic network protocol for secure remote access and command execution.
Standard
How Used
Security
Where Used
- Remote server administration
- Secure file transfer (SFTP)
- Tunneling other protocols
- Git repository access
Example Usage
Key Characteristics
Strong encryption Multiple authentication methods Port forwarding Compression supportSMTP (Simple Mail Transfer Protocol)
Protocol for sending email messages between mail servers and email clients.
Standard
How Used
Security
Where Used
- Email sending
- Mail server communication
- Automated notifications
- Newsletter distribution
Example Usage
Key Characteristics
Text-based protocol Store-and-forward mechanism Multiple recipient support Extension mechanismsSNMP (Simple Network Management Protocol)
Protocol for collecting and organizing information about managed devices on IP networks.
Standard
How Used
Security
Where Used
- Network monitoring
- Device management
- Performance monitoring
- Network troubleshooting
Example Usage
Key Characteristics
Manager-agent architecture MIB (Management Information Base) Trap notifications Extensible frameworkICMP (Internet Control Message Protocol)
Network layer protocol used for error reporting and network diagnostics.
Standard
How Used
Security
Where Used
- Network diagnostics (ping)
- Error reporting
- Path MTU discovery
- Network troubleshooting
Example Usage
Key Characteristics
Error reporting Network diagnostics No data payload Various message typesARP (Address Resolution Protocol)
Protocol that maps IP addresses to MAC addresses on local network segments.
Standard
How Used
Security
Where Used
- Local network communication
- Ethernet networks
- WiFi networks
- IP to MAC resolution
Example Usage
Key Characteristics
Broadcast-based Local network only Cache mechanism Request-reply modelBGP (Border Gateway Protocol)
Exterior gateway protocol for exchanging routing information between autonomous systems on the Internet.
Standard
How Used
Security
Where Used
- Internet routing
- ISP interconnection
- Enterprise multi-homing
- Content delivery networks
Example Usage
Key Characteristics
Path vector protocol Policy-based routing AS-path information Incremental updatesOSPF (Open Shortest Path First)
Interior gateway protocol that uses link-state routing algorithm for IP networks.
Standard
How Used
Security
Where Used
- Enterprise networks
- ISP internal routing
- Data center networks
- Campus networks
Example Usage
Key Characteristics
Link-state protocol Hierarchical design Fast convergence Load balancing supportSMTP (Simple Mail Transfer Protocol)
Application layer protocol for sending and routing email messages between mail servers.
Standard
How Used
Security
Where Used
- Email transmission between servers
- Outgoing email from email clients
- Automated system notifications
- Marketing email campaigns
Example Usage
Key Characteristics
Text-based protocol Push-based delivery Store and forward Multiple recipient supportPOP3 (Post Office Protocol v3)
Application layer protocol for retrieving email from a mail server to a single client device.
Standard
How Used
Security
Where Used
- Email retrieval for offline reading
- Single device email access
- Limited storage email accounts
- Simple email client configurations
Example Usage
Key Characteristics
Download and delete model Single client access Stateless protocol Simple command structureIMAP (Internet Message Access Protocol)
Application layer protocol for accessing and managing email messages stored on a mail server.
Standard
How Used
Security
Where Used
- Multi-device email synchronization
- Server-side email storage
- Shared mailbox access
- Advanced email organization
Example Usage
Key Characteristics
Server-side storage Multi-client access Stateful protocol Advanced searching and organizingSSH (Secure Shell)
Cryptographic network protocol for operating network services securely over an unsecured network.
Standard
How Used
Security
Where Used
- Remote server administration
- Secure file transfer (SFTP, SCP)
- Port forwarding and tunneling
- Git repository access
Example Usage
Key Characteristics
End-to-end encryption Multiple authentication methods Port forwarding capabilities Session multiplexingTelnet
Application layer protocol providing bidirectional interactive text-oriented communication over networks.
Standard
How Used
Security
Where Used
- Legacy system administration
- Network device configuration
- Testing network connectivity
- Debugging network services
Example Usage
Key Characteristics
Plain text protocol Virtual terminal interface Simple command structure Legacy protocolSNMP (Simple Network Management Protocol)
Application layer protocol for collecting and organizing information about managed devices on IP networks.
Standard
How Used
Security
Where Used
- Network monitoring and management
- Device performance tracking
- Configuration management
- Fault detection and alerting
Example Usage
Key Characteristics
Manager-agent architecture MIB (Management Information Base) Polling and trap mechanisms Standardized data structureLDAP (Lightweight Directory Access Protocol)
Application layer protocol for accessing and maintaining distributed directory information services.
Standard
How Used
Security
Where Used
- Active Directory authentication
- Corporate directory services
- Single sign-on (SSO) systems
- Contact and user management
Example Usage
Key Characteristics
Hierarchical directory structure Distinguished name addressing Standardized schema Cross-platform compatibilityNTP (Network Time Protocol)
Networking protocol for clock synchronization between computer systems over packet-switched networks.
Standard
How Used
Security
Where Used
- System clock synchronization
- Distributed system coordination
- Log file timestamp accuracy
- Financial transaction timestamping
Example Usage
Key Characteristics
Hierarchical stratum architecture Microsecond precision Fault tolerance Automatic server selectionICMP (Internet Control Message Protocol)
Supporting protocol in the IP suite used for error reporting and operational information.
Standard
How Used
Security
Where Used
- Network diagnostics (ping, traceroute)
- Error reporting between routers
- Path MTU discovery
- Network troubleshooting
Example Usage
Key Characteristics
Error reporting mechanism Diagnostic tool support No data payload Router-to-host communicationARP (Address Resolution Protocol)
Communication protocol used for discovering link layer addresses associated with IP addresses.
Standard
How Used
Security
Where Used
- Local network communication
- IP to MAC address mapping
- Ethernet frame delivery
- Switch learning processes
Example Usage
Key Characteristics
Broadcast-based resolution Cache mechanism Local network scope Hardware address mappingRARP (Reverse Address Resolution Protocol)
Network protocol used by diskless workstations to find their IP address from their MAC address.
Standard
How Used
Security
Where Used
- Diskless workstations
- Network boot processes
- Embedded systems
- Legacy network configurations
Example Usage
Key Characteristics
Reverse of ARP Broadcast-based request Requires RARP server Legacy protocolSTP (Spanning Tree Protocol)
Network protocol that builds a loop-free logical topology for Ethernet networks.
Standard
How Used
Security
Where Used
- Ethernet switch networks
- Loop prevention in LANs
- Network redundancy management
- Campus network design
Example Usage
Key Characteristics
Loop prevention Automatic topology discovery Root bridge election Port state managementVLAN (Virtual Local Area Network)
Method of creating logically separate network segments within a single physical network infrastructure.
Standard
How Used
Security
Where Used
- Network segmentation
- Broadcast domain isolation
- Security policy enforcement
- Traffic management
Example Usage
Key Characteristics
Logical network separation Broadcast domain control Frame tagging (802.1Q) Scalable network designPPP (Point-to-Point Protocol)
Data link layer protocol commonly used to establish direct connection between network nodes.
Standard
How Used
Security
Where Used
- Dial-up internet connections
- VPN implementations
- Serial line communications
- DSL and cable modems
Example Usage
Key Characteristics
Point-to-point connectivity Authentication support Multiple network protocol support Error detection and correctionOSPF (Open Shortest Path First)
Link-state routing protocol that uses Dijkstra's algorithm to find shortest path between nodes.
Standard
How Used
Security
Where Used
- Enterprise network routing
- ISP internal routing
- Campus network backbones
- Data center interconnects
Example Usage
Key Characteristics
Link-state protocol Hierarchical area design Fast convergence VLSM supportBGP (Border Gateway Protocol)
Standardized exterior gateway protocol designed to exchange routing information between autonomous systems.
Standard
How Used
Security
Where Used
- Internet backbone routing
- ISP interconnections
- Multi-homed networks
- Content delivery networks
Example Usage
Key Characteristics
Path vector protocol Policy-based routing Autonomous system based Internet glue protocolRIP (Routing Information Protocol)
Distance-vector routing protocol that uses hop count as routing metric.
Standard
How Used
Security
Where Used
- Small network routing
- Legacy network compatibility
- Simple network topologies
- Educational environments
Example Usage
Key Characteristics
Distance-vector protocol 15 hop limit Periodic updates Simple configurationEIGRP (Enhanced Interior Gateway Routing Protocol)
Cisco proprietary advanced distance-vector routing protocol with fast convergence.
Standard
How Used
Security
Where Used
- Cisco enterprise networks
- Campus network routing
- WAN interconnections
- Hybrid network topologies
Example Usage
Key Characteristics
Advanced distance-vector Fast convergence Unequal cost load balancing Cisco proprietaryIPSec (Internet Protocol Security)
Secure network protocol suite that authenticates and encrypts packets of data communicated over IP networks.
Standard
How Used
Security
Where Used
- VPN implementations
- Site-to-site connections
- Remote access security
- Cloud network security
Example Usage
Key Characteristics
IP layer security Authentication and encryption Tunnel and transport modes Key management (IKE)L2TP (Layer 2 Tunneling Protocol)
Tunneling protocol used to support VPNs as part of the delivery of services by ISPs.
Standard
How Used
Security
Where Used
- ISP VPN services
- Remote access VPNs
- Mobile device VPNs
- Wholesale internet services
Example Usage
Key Characteristics
Layer 2 tunneling UDP-based transport Multiple session support PPP session encapsulationPPTP (Point-to-Point Tunneling Protocol)
Method for implementing virtual private networks using PPP over IP networks.
Standard
How Used
Security
Where Used
- Legacy VPN implementations
- Windows built-in VPN
- Simple remote access
- Small office networks
Example Usage
Key Characteristics
PPP encapsulation Microsoft developed Built into Windows Legacy protocolGRE (Generic Routing Encapsulation)
Tunneling protocol that encapsulates network layer protocols inside virtual point-to-point links.
Standard
How Used
Security
Where Used
- VPN implementations
- Network tunneling
- Multicast over WAN
- Protocol bridging
Example Usage
Key Characteristics
Simple tunneling Multiple protocol support Stateless protocol Recursive tunnelingMPLS (Multiprotocol Label Switching)
Routing technique that directs data from one node to next based on short path labels.
Standard
How Used
Security
Where Used
- ISP backbone networks
- Enterprise WAN services
- Traffic engineering
- VPN implementations
Example Usage
Key Characteristics
Label-based forwarding Quality of Service support Traffic engineering VPN servicesVXLAN (Virtual Extensible LAN)
Network virtualization technology that uses tunneling to stretch Layer 2 connections over Layer 3 networks.
Standard
How Used
Security
Where Used
- Data center virtualization
- Cloud networking
- Multi-tenant environments
- Software-defined networking
Example Usage
Key Characteristics
Layer 2 overlay 24-bit VNI addressing UDP encapsulation Scalable virtualizationOpenVPN
Open-source VPN protocol that uses SSL/TLS for encryption and authentication.
Standard
How Used
Security
Where Used
- Remote access VPNs
- Site-to-site connections
- Personal privacy VPNs
- Enterprise security
Example Usage
Key Characteristics
SSL/TLS based Cross-platform support Flexible configuration Open sourceWireGuard
Modern VPN protocol designed for simplicity, performance, and strong cryptography.
Standard
How Used
Security
Where Used
- Modern VPN implementations
- Mobile device VPNs
- Cloud interconnections
- Personal privacy networks
Example Usage
Key Characteristics
Modern cryptography Minimal codebase High performance Simple configurationRTSP (Real Time Streaming Protocol)
Network control protocol for streaming media servers to control streaming media sessions.
Standard
How Used
Security
Where Used
- IP cameras and surveillance
- Video streaming servers
- Live broadcast systems
- Video conferencing
Example Usage
Key Characteristics
Session control protocol Media server control Real-time streaming Stateful protocolRTP (Real-time Transport Protocol)
Network protocol for delivering audio and video over IP networks in real-time applications.
Standard
How Used
Security
Where Used
- Voice over IP (VoIP)
- Video conferencing
- Live streaming applications
- Real-time multimedia
Example Usage
Key Characteristics
Real-time delivery Sequence numbering Timestamp synchronization Quality of ServiceSIP (Session Initiation Protocol)
Signaling protocol used for initiating, maintaining, and terminating real-time sessions.
Standard
How Used
Security
Where Used
- VoIP phone systems
- Video conferencing setup
- Instant messaging
- Presence services
Example Usage
Key Characteristics
Session establishment Text-based protocol Stateless design Multimedia supportWebRTC
Open framework that provides web browsers with real-time communication capabilities.
Standard
How Used
Security
Where Used
- Browser-based video calls
- Web conferencing applications
- Peer-to-peer file sharing
- Real-time gaming
Example Usage
Key Characteristics
Browser native support Peer-to-peer communication Real-time media No plugin requiredMQTT (Message Queuing Telemetry Transport)
Lightweight messaging protocol designed for small sensors and mobile devices with limited bandwidth.
Standard
How Used
Security
Where Used
- IoT device communication
- Sensor networks
- Smart home systems
- Industrial automation
Example Usage
Key Characteristics
Lightweight protocol Publish-subscribe model Quality of Service levels Session persistenceCoAP (Constrained Application Protocol)
Specialized web transfer protocol for constrained nodes and networks in IoT applications.
Standard
How Used
Security
Where Used
- Constrained IoT devices
- Sensor networks
- Machine-to-machine communication
- Smart city infrastructure
Example Usage
Key Characteristics
RESTful design UDP-based transport Low overhead Proxy supportLoRaWAN
Low-power wide-area networking protocol designed for wireless IoT devices with long range communication.
Standard
How Used
Security
Where Used
- Smart city infrastructure
- Agricultural monitoring
- Asset tracking
- Environmental sensing
Example Usage
Key Characteristics
Long range communication Low power consumption Star network topology Adaptive data rateZigbee
IEEE 802.15.4-based specification for high-level communication protocols used in personal area networks.
Standard
How Used
Security
Where Used
- Home automation systems
- Smart lighting control
- Security systems
- Industrial monitoring
Example Usage
Key Characteristics
Mesh networking Low power consumption Self-healing network InteroperabilityBluetooth LE
Wireless personal area network technology designed for short-range communication with low energy consumption.
Standard
How Used
Security
Where Used
- Wearable devices
- Fitness trackers
- Proximity beacons
- Health monitoring
Example Usage
Key Characteristics
Ultra-low power Short range communication Advertising mode GATT servicesNFC (Near Field Communication)
Short-range wireless communication technology enabling data exchange between devices in close proximity.
Standard
How Used
Security
Where Used
- Contactless payments
- Access control systems
- Device pairing
- Information sharing
Example Usage
Key Characteristics
Very short range (4cm) Passive and active modes Quick connection setup Secure transactionsWi-Fi 6 (802.11ax)
Latest generation of wireless networking technology providing increased speed and efficiency.
Standard
How Used
Security
Where Used
- High-density environments
- Enterprise networks
- Smart homes
- Public Wi-Fi hotspots
Example Usage
Key Characteristics
High throughput Improved efficiency Better range Enhanced security5G NR (New Radio)
Fifth generation cellular network technology providing ultra-fast wireless communication.
Standard
How Used
Security
Where Used
- Mobile broadband
- IoT applications
- Autonomous vehicles
- Industrial automation
Example Usage
Key Characteristics
Ultra-high speed Low latency Massive device connectivity Network slicingHTTP/3
Third major version of HTTP protocol using QUIC transport for improved performance and security.
Standard
How Used
Security
Where Used
- Modern web applications
- Content delivery networks
- Real-time web services
- Mobile web browsing
Example Usage
Key Characteristics
Built on QUIC protocol Multiplexed streams Reduced latency Connection migrationQUIC
Modern transport protocol providing secure multiplexed connections with reduced latency.
Standard
How Used
Security
Where Used
- HTTP/3 implementations
- Real-time applications
- Content delivery
- Gaming platforms
Example Usage
Key Characteristics
Built-in encryption Stream multiplexing Connection migration Reduced handshakeDNS over HTTPS (DoH)
Protocol for performing remote DNS resolution via HTTPS to improve privacy and security.
Standard
How Used
Security
Where Used
- Privacy-focused browsers
- Enterprise security
- Censorship circumvention
- Mobile applications
Example Usage
Key Characteristics
DNS privacy protection HTTPS encryption Standard web port usage Browser integrationDNS over TLS (DoT)
Security protocol for encrypting and wrapping DNS queries and responses via TLS.
Standard
How Used
Security
Where Used
- Enterprise DNS security
- ISP privacy protection
- Mobile device security
- Network monitoring evasion
Example Usage
Key Characteristics
Dedicated port (853) TLS encryption DNS privacy Certificate validationmDNS (Multicast DNS)
Protocol that performs DNS-like operations on local network without requiring DNS server.
Standard
How Used
Security
Where Used
- Apple Bonjour services
- Printer discovery
- Smart home devices
- Local service discovery
Example Usage
Key Characteristics
Zero-configuration networking Local network resolution Multicast-based Service discoverySCTP (Stream Control Transmission Protocol)
Transport layer protocol providing reliable, ordered delivery of data with multi-homing support.
Standard
How Used
Security
Where Used
- Telecommunications signaling
- WebRTC data channels
- Fault-tolerant applications
- Multi-homed servers
Example Usage
Key Characteristics
Multi-streaming Multi-homing support Message-oriented Partial reliabilityWebSocket
Communication protocol providing full-duplex communication channels over a single TCP connection.
Standard
How Used
Security
Where Used
- Real-time web applications
- Online gaming
- Live chat systems
- Financial trading platforms
Example Usage
Key Characteristics
Full-duplex communication Low latency HTTP-compatible upgrade Real-time messagingGraphQL
Data query and manipulation language for APIs and a runtime for fulfilling queries with existing data.
Standard
How Used
Security
Where Used
- Modern API development
- Frontend-backend communication
- Mobile application backends
- Microservices architecture
Example Usage
Key Characteristics
Single endpoint Type system Real-time subscriptions IntrospectiongRPC
High-performance RPC framework that uses HTTP/2 for transport and Protocol Buffers as interface description language.
Standard
How Used
Security
Where Used
- Microservices communication
- High-performance APIs
- Cloud-native applications
- Inter-service communication
Example Usage
Key Characteristics
HTTP/2 based Protocol Buffers Streaming support Cross-languageAMQP (Advanced Message Queuing Protocol)
Open standard application layer protocol for message-oriented middleware focused on queuing, routing, and security.
Standard
How Used
Security
Where Used
- Enterprise messaging systems
- Microservices communication
- Event-driven architectures
- Financial trading systems
Example Usage
Key Characteristics
Message queuing Reliable delivery Routing and filtering Transaction supportSTOMP (Simple Text Oriented Messaging Protocol)
Simple text-based protocol for connecting to message brokers and enabling publish-subscribe messaging.
Standard
How Used
Security
Where Used
- Web-based messaging
- Real-time notifications
- Chat applications
- Live data feeds
Example Usage
Key Characteristics
Text-based protocol Simple frame structure Message acknowledgment Subscription managementKafka Protocol
High-throughput distributed streaming platform protocol for handling real-time data feeds.
Standard
How Used
Security
Where Used
- Big data streaming
- Event sourcing systems
- Log aggregation
- Real-time analytics
Example Usage
Key Characteristics
High throughput Distributed partitioning Data persistence Stream processingRedis Protocol (RESP)
Simple protocol used for communication with Redis in-memory data structure store.
Standard
How Used
Security
Where Used
- Caching systems
- Session storage
- Real-time applications
- Message queuing
Example Usage
Key Characteristics
Simple text protocol Binary-safe strings Pipelining support Pub/Sub messagingMemcached Protocol
Simple protocol for high-performance distributed memory caching system.
Standard
How Used
Security
Where Used
- Web application caching
- Database query caching
- Session caching
- API response caching
Example Usage
Key Characteristics
Key-value storage LRU eviction Distributed caching Simple protocolElasticsearch REST API
RESTful API protocol for distributed search and analytics engine based on Lucene.
Standard
How Used
Security
Where Used
- Full-text search
- Log analysis
- Business intelligence
- Application monitoring
Example Usage
Key Characteristics
RESTful interface JSON-based queries Real-time indexing Distributed architectureMongoDB Wire Protocol
Binary protocol for communication between MongoDB drivers and database servers.
Standard
How Used
Security
Where Used
- Document databases
- Content management
- Real-time applications
- Big data storage
Example Usage
Key Characteristics
Binary protocol BSON data format Document-oriented Replica set supportMySQL Protocol
Client-server protocol for communication with MySQL relational database management system.
Standard
How Used
Security
Where Used
- Web applications
- E-commerce platforms
- Content management systems
- Data warehousing
Example Usage
Key Characteristics
SQL-based queries ACID compliance Replication support Storage enginesPostgreSQL Protocol
Frontend-backend protocol for communication with PostgreSQL object-relational database system.
Standard
How Used
Security
Where Used
- Enterprise applications
- Data analytics
- Geospatial applications
- Financial systems
Example Usage
Key Characteristics
Extended SQL support Custom data types MVCC concurrency Extensible architectureOracle TNS
Transparent Network Substrate protocol for Oracle database connectivity and communication.
Standard
How Used
Security
Where Used
- Enterprise databases
- Mission-critical applications
- Data warehousing
- Financial systems
Example Usage
Key Characteristics
Connection multiplexing Load balancing Service registration Failover supportGit Protocol
Protocol for efficient transfer of git repository data between client and server.
Standard
How Used
Security
Where Used
- Source code management
- Software development
- CI/CD pipelines
- Collaborative development
Example Usage
Key Characteristics
Delta compression Smart protocol Pack file format Distributed version controlDocker Registry API
HTTP API specification for storing and distributing Docker images and other content.
Standard
How Used
Security
Where Used
- Container image storage
- CI/CD pipelines
- Container orchestration
- Application deployment
Example Usage
Key Characteristics
RESTful API Layer-based storage Content addressable Manifest formatKubernetes API
RESTful API for managing containerized applications in Kubernetes clusters.
Standard
How Used
Security
Where Used
- Container orchestration
- Microservices management
- Cloud-native applications
- DevOps automation
Example Usage
Key Characteristics
Declarative API Resource-based Watch mechanism Custom resourcesXMPP (Extensible Messaging and Presence Protocol)
Open standard communication protocol for message-oriented middleware based on XML.
Standard
How Used
Security
Where Used
- Instant messaging
- Presence information
- IoT device communication
- Real-time collaboration
Example Usage
Key Characteristics
XML-based messaging Presence information Extensible protocol Federation supportIRC (Internet Relay Chat)
Application layer protocol for real-time text messaging and communication in channels.
Standard
How Used
Security
Where Used
- Community chat rooms
- Developer collaboration
- Technical support
- Open source projects
Example Usage
Key Characteristics
Channel-based chat Text-based protocol Server networks User modes and privilegesMatrix Protocol
Open standard for secure, decentralized, real-time communication over IP networks.
Standard
How Used
Security
Where Used
- Secure messaging
- Team collaboration
- Voice/video calling
- Bridging other protocols