Official protocols (RFC0880)
Original Publication Date: 1983-Oct-01
Included in the Prior Art Database: 2000-Sep-13
Internet Society Requests For Comment (RFCs)
J.K. Reynolds: AUTHOR [+2]
This RFC identifies the documents specifying the official protocols used in the Internet. Annotations identify any revisions or changes planned.
Network Working Group J. Reynolds
Request for Comments: 880 J. Postel
Obsoletes: RFC 840 October 1983
This RFC identifies the documents specifying the official protocols used
in the Internet. Annotations identify any revisions or changes planned.
To first order, the official protocols are those in the "Internet
Protocol Transition Workbook" (IPTW) dated March 1982. There are
several protocols in use that are not in the IPTW. A few of the
protocols in the IPTW have been revised. Notably, the mail protocols
have been revised and issued as a volume titled "Internet Mail
Protocols" dated November 1982. Telnet and the most useful option
protocols were issued by the NIC in a booklet entitled "Internet Telnet
Protocol and Options" (ITP), dated June 1983. Some protocols have not
been revised for many years, these are found in the old "ARPANET
Protocol Handbook" (APH) dated January 1978. There is also a volume of
protocol related information called the "Internet Protocol Implementers
Guide" (IPIG) dated August 1982.
This document is organized as a sketchy outline. The entries are
protocols (e.g., Transmission Control Protocol). In each entry there
are notes on status, specification, comments, other references,
dependencies, and contact.
The status is one of: required, recommended, elective, or
The specification identifies the protocol defining documents.
The comments describe any differences from the specification or
problems with the protocol.
The other references identify documents that comment on or expand on
The dependencies indicate what other protocols are called upon by
The contact indicates a person who can answer questions about the
Official Protocols RFC 880
In particular, the status may be:
- all hosts must implement the required protocol,
- all hosts are encouraged to implement the recommended
- hosts may implement or not the elective protocol,
- hosts should not implement the experimental protocol unless
they are participating in the experiment and have coordinated
their use of this protocol with the contact person, and
- this is not a protocol.
Catenet Model -------...