protocols

What are the perceived/actual advantages of Kerberos? Are there any viable alternatives to the technology?

We are planning on utilising kerberos in our architecture. I would like to know what perceived or actual advantages this technology has, and if there are any alternatives. Note that we have a .net client side and java server side. communication will be via messaging bus and SOA ...

Why does the iPhone SDK use categories, rather than protocols, for some delegates?

My understanding is that protocols are like interfaces in other languages -- they declare expected methods -- while categories allow you to add new methods to existing types (perhaps even types you don't own.) Why, then, does the iPhone SDK sometimes use categories for declaring delegate types? Normally I would expect all delegates to b...

Optimizing protocol opening operation over tcp connection opening

I'm designing a new protocol called DITP. It is a connection oriented protocol that would use TCP as transport layer. With common Internet protocols, when the TCP connection is established, the server starts by sending a greeting message to what the client respond, eventually sending its first request. I figured out I could save one rou...

Python Twisted protocol unregistering?

Hi, I've came up with problem regarding unregistering protocols from reactor in twisted while application is running. I use hardware modems connected to PC by USB and that's why this scenario is so important for my solution. Has anyone an idea how to do it? Greets, Chris ...

Does BitTorrent support partial transfers?

Can the BitTorrent protocol specify wanting the first 3% or first 5% of the file first? If not, would adding such support be an improvement to the protocol? Update: so i guess, if it is part of the protocol, why the many clients out there do not use it? After 10 minutes, 10% of the file is done, but usually you cannot even preview 1% o...

Remote Locking

I am designing a remote threading primitive protocol. Currently we only needs mutexes (i.e. Monitors) and semaphores. The main idea is that there doesn't need to be a central authority - the primitives should be orchestrated amongst the peers that are interested in them. I have bashed a few ideas around on paper and in my head for a few...

jabber protocol problem

One of the contacts of my jabber robot, whose 'subscription' attribute value is 'to', which according to jabber protocol mean: **the robot has subscribed to the other party's online status, but the other party has not subscribed to my robot's.** But when I login to the other party account, I can see that robot is online, why is it...

Protocol Terminology: Message versus Packet

In practice, what is the most appropriate term for the communications transmitted over a network in higher level protocols (those above TCP/IP, for example)? Specifically, I am referring to small, binary units of data. I have seen both "message" and "packet" referred to in various client/server libraries, but I was interested in the com...

What is the difference between DTR/DSR and RTS/CTS flow control?

What's the difference between DTR/DSR and RTS/CTS hardware flow control? When is each one used? Why do we need more than one kind of hardware flow control? :) ...

objective-c protocol defined in its own .h file?

Unless I'm missing something, it seems arbitrary in which .h file I put the protocol definition. I'm even wondering if it could be in it's own .h file... (in Java, it's in its own file) ...

sending messages over tcp with priority in C#

I am developing a chat protocol in C# and I want several types of messages sent on the same connections, for example, text and application(eg file transfer) messages. Because applications may easily fill the TCP buffer, text messages may have a big delay until they sent, so I want them to have a certain priority over other messages. //p...

Which protocol to use for authentication within a web service?

What protocol should I use to secure a webservice. I'm considering CHAP, but I cann't find much about it in relation to web services. SubAuth and OAuth is more about giving web services acces to something else, so that's not what I'm looking for. I need to authenticate a user without sending it's credentials over the line. I've read the...

Recommend OpenSource or Freeware tool to inspect network traffic between two servers

I am currently in the process of locking down the network communication protocols that are available for use on given Windows application platform. Can you suggest a freely available tool that will allow me to monitor/identify the commuications protocols that are in use i.e. TCP/IP http https FTP SFTP ...

Implementing Bittorrent Protocol

I am looking for a tutorial/blog post on how to implement bittorrent protocol step by step. How it works? How do you make requests to peers? and talk to trackers. I do not mind the programming language (java,ruby,perl,c#) ...

Advantages of keeping to a protocol for a data model

Hi all, The question title is probably not correct because part of my question is to try and get some more understanding on the problem. I am looking for the advantages of making sure data that is imported to a database (simple example: Excel table to Access database) should be given using the same schema and should also be valid to th...

To pad or not to pad - creating a communication protocol

Hi all, I am creating a protocol to have two applications talk over a TCP/IP stream and am figuring out how to design a header for my messages. Using the TCP header as an initial guide, I am wondering if I will need padding. I understand that when we're dealing with a cache, we want to make sure that data being stored fits in a row of...

Problem when creating Asynchronous Pluggable Protocol on Vista

Hello, I have created a tutorial for creating a dzone protocol (so that I can type dzone:n in firefox to get the new links for example), it works great but when at the end I want to create a new alias protocol dn which points to the same handler, Vista doesn't want to take this new path though registry entry is ok (I check by renaming d...

Why HTTP protocol was designed to be connectionless at first?

As far as I'm concerned, Ajax provides a workaround for behaving like connection-oriented with HTTP protocol. But why wasn't HTTP protocol designed to be connection-oriended at first? ...

What protocol should I use for fast command/response interactions?

Hi everyone. I need to set up a protocol for fast command/response interactions. My instinct tells me to just knock together a simple protocol with CRLF separated ascii strings like how SMTP or POP3 works, and tunnel it through SSH/SSL if I need it to be secured. While I could just do this, I'd prefer to build on an existing technology ...

Objective-C: Protocols

I'd like an instance variable object to adopt a protocol. @interface GameScene : Scene <AVAudioPlayerDelegate> { @private Layer *content <CocosNodeOpacity>; } For example I'd like my Layer object to adopt the <CocosNodeOpacity> so that I can get the methods -(GLubyte) opacity; //and -(void) setOpacity: (GLubyte) opacity; fo...