Network protocol :-
1. Proprietary
2.Open
Proprietary:-
· Ownership by a single organization gives
the owner the ability to place restrictions on the use of the protocol and to
change the protocol unilaterally.
· Specifications for proprietary protocols may
or may not be published, and implementations are not freely
distributed.
· Proprietors may enforce restrictions through
control of the intellectual property rights, for example through enforcement
of patent rights, and by keeping the protocol
specification a trade secret.
· Some proprietary protocols strictly limit the
right to create an implementation; others are widely implemented by entities
that do not control the intellectual property but subject to restrictions the
owner of the intellectual property may seek to impose.