Protokol Jaringan
Jelajahi 123 protokol jaringan yang diorganisir berdasarkan lapisan model OSI — dari lapisan fisik hingga lapisan aplikasi.
Application Layer (84)
Foundation of data communication on the web. Defines request/response methods (GET, POST, PUT, DELETE) for …
HTTP encrypted with TLS. Provides authentication, data integrity, and confidentiality for web traffic. Standard for …
Major revision of HTTP with binary framing, multiplexed streams, header compression (HPACK), and server push …
Latest HTTP version running over QUIC (UDP) instead of TCP. Eliminates head-of-line blocking and reduces …
Full-duplex communication protocol over a single TCP connection. Enables real-time bidirectional data exchange between client …
Standard protocol for sending email between mail servers. Handles message routing, delivery, and relay across …
Protocol for retrieving email that keeps messages on the server. Supports folders, search, and multi-device …
Protocol for downloading email from a server to a local client. Typically deletes messages from …
Standard protocol for transferring files between hosts. Uses separate control (port 21) and data (port …
Secure file transfer over SSH. Provides encrypted file access, transfer, and management. Not related to …
Simplified file transfer protocol using UDP. Used for network booting (PXE), firmware updates, and configuration …
Encrypted protocol for secure remote login, command execution, and tunneling. Replaced insecure Telnet for server …
Legacy unencrypted remote terminal protocol. Transmits data including passwords in plaintext. Replaced by SSH for …
Microsoft protocol for remote graphical desktop access. Supports display, input, audio redirection, and multi-monitor setups.
Platform-independent remote desktop protocol using the RFB (Remote Framebuffer) protocol. Works across Windows, macOS, and …
Hierarchical distributed naming system translating human-readable domain names to IP addresses. The internet's phone book.
DNS resolution encrypted within HTTPS connections. Prevents DNS eavesdropping and manipulation by ISPs and network …
DNS resolution encrypted with TLS on a dedicated port. Provides DNS privacy while remaining distinguishable …
Protocol for monitoring and managing network devices (routers, switches, servers). Collects metrics via OIDs from …
Protocol for clock synchronization across networks. Achieves millisecond-level accuracy using a hierarchy of time sources …
Standard for message logging. Separates message generation from storage, enabling centralized log collection from diverse …
Protocol for accessing and maintaining distributed directory information services. Used for authentication and user/group management.
AAA protocol (Authentication, Authorization, Accounting) for network access. Widely used for Wi-Fi, VPN, and ISP …
Open-source VPN protocol using SSL/TLS for encryption. Highly configurable and widely supported by commercial VPN …
Automatically assigns IP addresses, subnet masks, gateways, and DNS servers to devices joining a network. …
Email authentication protocol that specifies which mail servers are authorized to send email for a …
Email authentication method that uses cryptographic signatures to verify messages were not altered in transit …
Email policy protocol that builds on SPF and DKIM. Tells receivers how to handle messages …
Extensions to DNS that provide authentication of DNS data, verified denial of existence, and data …
Lightweight publish-subscribe messaging protocol designed for IoT and constrained devices. Minimizes bandwidth and battery usage …
High-performance RPC framework by Google using HTTP/2 and Protocol Buffers. Supports unary, client/server streaming, and …
Protocol that discovers public IP addresses and NAT types. Used by WebRTC, VoIP, and peer-to-peer …
Signaling protocol for initiating, maintaining, and terminating real-time voice, video, and messaging sessions over IP.
Protocol for delivering audio and video over IP networks. Provides timestamping, sequence numbering, and payload …
Lightweight RESTful protocol designed for constrained IoT devices and low-power networks. Uses UDP with optional …
OMA-defined device management protocol built on top of CoAP. Provides device registration, remote management, firmware …
Open standard application-layer protocol for message-oriented middleware. Provides reliable message queuing, routing, and delivery with …
OMG publish-subscribe middleware standard for real-time, data-centric communication. Used in autonomous vehicles, robotics, defense, and …
Unified smart home connectivity standard supported by Apple, Google, Amazon, and Samsung. Runs over Thread …
Serial communication protocol developed in 1979 for programmable logic controllers. Uses master/slave architecture with register-based …
Platform-independent IIoT interoperability standard with built-in security, information modeling, and service-oriented architecture. Successor to OPC …
Industrial Ethernet standard by PROFIBUS & PROFINET International. Provides deterministic real-time communication for factory automation, …
Industrial Ethernet adaptation of the Common Industrial Protocol (CIP) from ODVA. Widely used in North …
ASHRAE/ISO standard protocol for building automation systems. Connects HVAC, lighting, access control, and fire safety …
Robust communication protocol for SCADA systems in electric utilities and water treatment. Designed for noisy …
Hybrid analog/digital protocol overlaying digital communication on the standard 4–20 mA analog signal. Widely used …
Application-layer protocol for controlling real-time media streams. Acts as a 'network remote control' to play, …
Adobe protocol for streaming audio, video, and data over TCP. Still widely used for live …
Apple's adaptive bitrate streaming protocol delivering media as small HTTP-based file segments. Supported universally across …
ISO standard adaptive bitrate video streaming using standard HTTP servers. Codec-agnostic and supports DRM. Used …
Open-source UDP-based protocol optimized for low-latency, high-quality video contribution over unpredictable networks. Provides AES encryption …
Container format for multiplexing audio, video, and metadata in broadcast and streaming. Used in DVB, …
Companion control protocol for RTP. Provides out-of-band statistics on quality of service including packet loss, …
IP-based storage networking protocol transporting SCSI commands over TCP/IP. Enables block storage access over standard …
Distributed file system protocol developed by Sun Microsystems allowing remote file access over a network …
Network file sharing protocol providing shared access to files, printers, and serial ports. Used by …
Binary client-server protocol used by MySQL and MariaDB databases. Features authentication handshake, capability negotiation, and …
Message-based frontend/backend protocol for PostgreSQL. Supports extended query mode with prepared statements, COPY bulk transfer, …
Simple text-based protocol used by Redis for client-server communication. RESP3 adds new data types including …
Binary protocol for the Memcached distributed memory caching system. Provides lower latency and better error …
Network authentication protocol using tickets issued by a Key Distribution Center (KDC). Provides mutual authentication …
Cisco-developed AAA protocol that separates authentication, authorization, and accounting into independent transactions. Encrypts the entire …
Authorization framework enabling third-party applications to obtain limited access to user accounts without exposing credentials. …
XML-based open standard for exchanging authentication and authorization data between identity providers and service providers. …
Identity layer on top of OAuth 2.0 that adds user authentication with ID tokens (JWTs). …
XML-based open protocol for real-time messaging, presence, and contact lists. Foundation of Google Talk and …
Simple, text-based protocol for interoperating with message brokers (ActiveMQ, RabbitMQ). Deliberately minimal with frame-based design, …
High-performance open-source messaging system for cloud-native applications. Supports core pub/sub, request/reply, and JetStream for persistent …
Brokerless messaging library providing socket-like API with message patterns (pub/sub, push/pull, request/reply). Operates over TCP, …
Open standard for decentralized, federated real-time communication. Rooms are replicated across homeservers; supports end-to-end encryption, …
Binary request/response protocol for the Apache Kafka distributed event streaming platform. Supports producer/consumer API, topic …
IETF protocol for installing, manipulating, and deleting network device configurations over SSH. Uses XML datastores …
HTTP-based protocol for accessing YANG-defined network management data via a RESTful interface. Complements NETCONF with …
gRPC-based protocol for network element configuration and state retrieval. Provides high-frequency telemetry streaming with YANG-modeled …
Cisco network protocol for collecting IP traffic flow information. Provides visibility into traffic patterns, bandwidth …
Multi-vendor sampling technology for monitoring traffic in high-speed networks. Uses statistical packet sampling and counter …
IETF standard for exporting IP flow information, evolving from Cisco NetFlow v9. Uses a template-based …
Protocol for controlling VoIP media gateways from an external call agent. Uses a master/slave model …
ITU-T standard for multimedia communications over packet networks. Comprehensive umbrella protocol covering audio (G.711, G.729), …
Encrypted extension of RTP providing confidentiality, message authentication, and replay protection for real-time audio and …
Early internet information retrieval protocol predating the web. Organized content in hierarchical menus with document …
Real-time text messaging protocol for group and private communication via channels. Open, federated design with …
Protocol for transporting Usenet news articles between servers and reading clients. Supports article retrieval, posting, …
Simple protocol for retrieving information about users on a remote system. Returns login name, full …
Transport Layer (7)
Connection-oriented, reliable transport protocol. Guarantees ordered delivery through three-way handshake, sequence numbers, and retransmission.
Connectionless, lightweight transport protocol. No delivery guarantees but minimal overhead — ideal for real-time applications.
UDP-based transport protocol with built-in TLS 1.3 encryption. Eliminates head-of-line blocking and reduces connection setup …
Cryptographic protocol providing privacy and data integrity between two communicating applications. TLS 1.3 is the …
Message-oriented transport protocol combining TCP reliability with UDP message boundaries. Supports multi-homing and multi-streaming.
Transport protocol providing bidirectional unicast congestion-controlled flows without reliability. Designed for multimedia streaming requiring congestion …
Extension to TCP allowing a single connection to use multiple network paths simultaneously. Improves throughput, …
Network Layer (22)
Modern VPN protocol with minimal codebase (~4,000 lines) using state-of-the-art cryptography. Faster and simpler than …
Suite of protocols securing IP communications through authentication (AH) and encryption (ESP). Used in site-to-site …
Fourth version of IP using 32-bit addresses (~4.3 billion unique addresses). Still carries the majority …
Latest version of IP using 128-bit addresses (3.4×10³⁸ unique addresses). Designed to replace IPv4 with …
Protocol for error reporting and network diagnostics. Powers ping and traceroute. Reports unreachable destinations and …
The routing protocol of the internet. Exchanges routing information between autonomous systems (ASes) to determine …
Interior gateway routing protocol using Dijkstra's shortest-path algorithm. Widely used within enterprise and ISP networks.
Protocol for managing multicast group membership on IPv4 networks. Hosts report group membership to routers …
Data forwarding technique using short path labels instead of long network addresses. Provides traffic engineering, …
Tunneling protocol combining features of PPTP and L2F. Often paired with IPsec for encryption in …
IEEE 802.15.4-based low-power mesh networking protocol for IoT. Operates at 2.4 GHz with up to …
Sub-GHz wireless mesh protocol designed for home automation. Operates at 908 MHz (US) / 868 …
Low-power wide-area network protocol using LoRa modulation. Enables long-range (10–15 km rural) IoT communication at …
IPv6-based low-power mesh networking protocol for home automation. IEEE 802.15.4 radio with border router for …
Distance-vector routing protocol using hop count as metric with a maximum of 15 hops. Simple …
Link-state routing protocol operating directly over Layer 2, not IP. Preferred by large ISPs and …
Provides automatic assignment of available IP routers to participating hosts. Elects a master router and …
Cisco-developed advanced distance-vector protocol using DUAL algorithm for fast loop-free convergence. Supports unequal-cost load balancing …
Multicast routing protocol that works with any unicast routing protocol. PIM-SM builds shared and source …
Tunneling protocol encapsulating a wide variety of network layer protocols inside IP tunnels. Used for …
Early VPN tunneling protocol developed by Microsoft. Deprecated due to serious cryptographic vulnerabilities in MS-CHAPv2. …
IPv6 protocol replacing ARP for mapping IP addresses to MAC addresses. Also handles router discovery, …
Data Link Layer (10)
Maps IP addresses to MAC (hardware) addresses on a local network. Essential for Ethernet frame …
Robust serial communication bus developed by Bosch for automotive and industrial use. Enables microcontrollers and …
Encapsulates Fibre Channel frames in Ethernet networks, enabling storage-area network (SAN) traffic over converged network …
High-speed network technology primarily used for storage-area networks in enterprise data centers. Provides guaranteed delivery, …
IEEE 802.1AB standard for advertising device identity, capabilities, and neighbors on local Ethernet segments. Enables …
Cisco proprietary Layer 2 protocol for discovering directly connected Cisco devices. Shares device type, IP …
Network virtualization overlay encapsulating Layer 2 frames within UDP. Extends VLANs across Layer 3 boundaries, …
Latest Wi-Fi security standard mandated by Wi-Fi Alliance. Introduces Simultaneous Authentication of Equals (SAE) replacing …
IEEE standard for port-based network access control. Authenticates devices before allowing LAN access using EAP …
IEEE 802.1AE standard providing hop-by-hop encryption and integrity verification of Ethernet frames. Protects against man-in-the-middle …