Content deleted Content added
Citation bot (talk | contribs) Altered url. URLs might have been anonymized. Add: authors 1-1. Removed parameters. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | Suggested by Abductive | Category:Computer architecture statements | #UCB_Category 10/28 |
|||
(2 intermediate revisions by one other user not shown) | |||
Line 8:
== Interpretation ==
The principle was first written down by Jon Postel in the 1979 [[IPv4]] specification.<ref>{{Cite book |last1=Council |first1=National Research |url=https://books.google.com/books?id=lm2C8PJY-NYC&pg=PA39 |title=The Internet's Coming of Age |last2=Sciences |first2=Division on Engineering and Physical |last3=Applications |first3=Commission on Physical Sciences, Mathematics, and |last4=Board |first4=Computer Science and Telecommunications |last5=Infrastructure |first5=Committee on the Internet in the Evolving Information |date=2001-01-22 |publisher=National Academies Press |isbn=978-0-309-17205-9 |language=en}}</ref> RFC 1122 (1989) expanded on Postel's principle by recommending that programmers "assume that the network is filled with malevolent entities that will send in packets designed to have the worst possible effect".<ref>{{cite IETF |title=Requirements for Internet Hosts: Communication Layers |rfc=1122 |editor1-last=Braden |editor1-first=R. |editor1-link=Bob Braden |date=October 1989 |publisher=[[IETF]] |access-date=June 9, 2014}}</ref> Protocols should allow for the addition of new codes for existing fields in future versions of protocols by accepting messages with unknown codes (possibly logging them). Programmers should avoid sending messages with "legal but obscure protocol features" that might expose deficiencies in receivers, and design their code "not just to survive other misbehaving hosts, but also to cooperate to limit the amount of disruption such hosts can cause to the shared communication facility".<ref name="Wilde2012">{{cite book |last=Wilde |first=Erik |title=Wilde's WWW: Technical Foundations of the World Wide Web |url=https://archive.org/details/springer_10.1007-978-3-642-95855-7 |date=2012 |orig-year=1999 |publisher=Springer‑Verlag |doi=10.1007/978-3-642-95855-7 |isbn=978-3-642-95855-7| page=[https://archive.org/details/springer_10.1007-978-3-642-95855-7/page/n48 26]|s2cid=19897299 }}</ref>
== Criticism ==
|