protocol suppression, id and authentication are examples of which?