Comparison_of_instant_messaging_protocols

Comparison of instant messaging protocols

Comparison of instant messaging protocols

Add article description


The following is a comparison of instant messaging protocols. It contains basic general information about the protocols.

Table of instant messaging protocols

More information Protocol, Creator ...
  1. One-to-many/many-to-many communications primarily comprise presence information, publish/subscribe and groupchat distribution. Some technologies have the ability to distribute data by multicast, avoiding bottlenecks on the sending side caused by the number of recipients. Efficient distribution of presence is currently however a technological scalability issue for both XMPP and SIP/SIMPLE.
  2. Serverless protocols don't have any central entities (usually companies) controlling the network. Serverless network consists only of clients. Such systems are usually extremely resistant to surveillance and censorship.
  3. There have been reports from users that the antispam filter is used to censor links to other IM programs and some websites.
  4. In [email protected], the a.b.com part is known as the "hostmask" and can either be the server being connected from or a "cloak" granted by the server administrator; a more realistic example is [email protected]. The tilde generally indicates that the username provided by the IRC client on signon was not verified with the ident service.
  5. Scalability issue: The protocol gets increasingly inefficient with the number of contacts.[7][8]
  6. In [email protected]/home, the home part is a "resource", which distinguishes the same user when logged in from multiple locations, possibly simultaneously; a more realistic example is [email protected]/home.

See also


References

  1. "Where can I find my User/Server/Message ID?". discord.com.
  2. "chathistory Extension". ircv3.net. Retrieved 25 February 2023.
  3. Gioia, Antonio. "IRC with SSL and OTR encryption". Retrieved 28 December 2023.
  4. RFC 1324, D. Reed, 1992. 2.5.1, Size
  5. "dcc.voice". kvirc.net. Retrieved 25 February 2023.
  6. Ermoshina, Ksenia; Musiani, Francesca; Halpin, Harry (September 2016). "End-to-End Encrypted Messaging Protocols: An Overview". In Bagnoli, Franco; et al. (eds.). Internet Science. INSCI 2016. Florence, Italy: Springer. pp. 244–254. doi:10.1007/978-3-319-45982-0_22. ISBN 978-3-319-45982-0.
  7. "Introducing P2P Matrix". matrix.org. The Matrix.org Foundation. Retrieved 19 June 2021.
  8. Marlinspike, Moxie (24 February 2014). "The New TextSecure: Privacy Beyond SMS". Open Whisper Systems. Retrieved 12 December 2015.
  9. Presence information is indicated to other users by a small coloured dot."Tox clients". tox.chat. Retrieved 2021-06-18.
  10. "XEP-0027: Current Jabber OpenPGP Usage". xmpp.org. 2014-03-14. Retrieved 2020-03-09.
  11. "XEP-0373: OpenPGP for XMPP". xmpp.org. 2018-07-30. Retrieved 2020-03-09.
  12. "XEP-0384: OMEMO Encryption". xmpp.org. 2018-07-31. Retrieved 2020-03-09.
  13. .eg route.all-resource in OpenFire
  14. "XEP-0045: Multi-User Chat". xmpp.org. 2019-05-15. Retrieved 2020-03-09.
  15. "XEP-0060: Publish-Subscribe". xmpp.org. 2019-10-06. Retrieved 2020-03-09.
  16. "XEP-0159: Spim-Blocking Control". xmpp.org. 2006-07-11. Retrieved 2020-03-09.
  17. "XEP-0161: Abuse Reporting". xmpp.org. 2007-05-06. Retrieved 2020-03-09.
  18. "XEP-0280: Message Carbons". xmpp.org. 2017-02-16. Retrieved 13 December 2018.
  19. "XEP-0174: Serverless Messaging". xmpp.org. 26 November 2008. Retrieved 1 November 2017.

Share this article:

This article uses material from the Wikipedia article Comparison_of_instant_messaging_protocols, and is written by contributors. Text is available under a CC BY-SA 4.0 International License; additional terms may apply. Images, videos and audio are available under their respective licenses.