Apo Networks Psuedo Protocols

History: 

Apo Networks started developing protocols late 2001 during the first introduced to the ICMPN (Internet Control Multimedia Protocol Network) pronounced I SEE EM PEAIN.

There fist invention was the Socket Uplink Commands or S.U.C. Largely proprietary the S.U.C. protocols were removed by the ISO and replaced by Universal Socket Uplink Commands U.S.U.C. !

Apo Networks had trouble selling their routers until them came up with the OCPF protocol. or Open Cheapest Path First. This protocol sacrifices everything for cost including but not limited to speed, reliability, and security. AOL was one of the Major buyers of the OCPF routers.

These OCPF routers relied on a resolution protocol called Cheapest Resolution Address Protocol or CRAP. This saved memory space by eliminating ARP tables from the memories of routers, but this resulted in numerous CRAP request and since a table was never built it just made more CRAP requests. 

Additionally Apo Networks developed certain file formats which revolutionized the internet


.sht (shit) Small hypertext tags: These hypertext tags were twice as short, this never went over well because you needed twice as many tags in your html file.

.flt (flat) A Flat file: Is a text file with every type of formatting available except line feeds. Its all one line

Ethernet relies on CDCM/CA collision detection. Once the ICMPN system detects a collision it sends out a File Access Reduce Traffic packet. These FART packets clear the network by making everyone access their FART file and finding length of timeout.

ICMPN is a scheme much like TCP/IP except that it does use a special kind of Token Passing. The first host on ICMPN networks starts a BLUNT (Binary Length Unary Network Transmission) packet. It is filled with a Dynamic Operation Protocol Envelope or DOPE. The host starts the BLUNT and passes it to the next host on the Network, they remove the dope, and can transmit at that time, and when finished they pass the BLUNT on to the next host. 

If the next host does not want to transmit it passes up the BLUNT packet . However if this happens this is just more DOPE transmission time to other nodes on the network. (the other nodes also laugh at the host that passed up the blunt). When the BLUNT packet returns to the host he is allowed to transmit until he has used up all the BLUNTS, DOPE time. After that the main host can either form another BLUNT or cancel the session.  

In a similar way the three way handshake is used to authenticate connections. It consist of three parts. First Host 1 contacts host two and negotiates rules for a data transfer. Then host 2 prepares is data and compresses it into a smaller packet. Host one and two make a connection. Host two passes data and host one returns a DOPE packet simultaneously. After this, both host break the connection as quickly as possible and do not connect again for 12 hours. 

Go back to Edward Capriolo.com
Save the nodes
Java Script Spot

1