<s>
Usenet	B-Protocol
II	I-Protocol
was	O
a	O
proposed	O
alternative	O
to	O
the	O
classic	O
Usenet	B-Application
hierarchy	O
,	O
started	O
in	O
1998	O
.	O
</s>
<s>
Unlike	O
the	O
original	O
Usenet	B-Application
,	O
it	O
was	O
peered	O
only	O
between	O
"	O
sound	O
sites	B-Application
"	O
and	O
employed	O
a	O
system	O
of	O
rules	O
to	O
keep	O
out	O
spam	B-Application
.	O
</s>
<s>
Usenet	B-Protocol
II	I-Protocol
was	O
backed	O
by	O
influential	O
Usenetters	B-Application
like	O
Russ	O
Allbery	O
.	O
</s>
<s>
Sometime	O
between	O
2010	O
and	O
2011	O
,	O
the	O
web	O
page	O
for	O
Usenet	B-Protocol
II	I-Protocol
went	O
offline	O
.	O
</s>
<s>
The	O
newsgroup	O
hierarchy	O
in	O
Usenet	B-Protocol
II	I-Protocol
revived	O
the	O
old	O
naming	O
system	O
used	O
by	O
Usenet	B-Application
before	O
the	B-Architecture
Great	I-Architecture
Renaming	I-Architecture
.	O
</s>
<s>
"	O
,	O
which	O
serve	O
to	O
distinguish	O
them	O
from	O
the	O
"	O
Big	B-Architecture
8	I-Architecture
"	O
(	O
misc	O
.	O
</s>
<s>
A	O
separate	O
checkgroup	O
system	O
,	O
using	O
the	O
same	O
technical	O
mechanism	O
as	O
the	O
one	O
produced	O
by	O
David	O
C	O
.	O
Lawrence	O
for	O
the	O
Big	B-Architecture
8	I-Architecture
,	O
enforced	O
the	O
Usenet	B-Protocol
II	I-Protocol
hierarchy	O
and	O
prevents	O
the	O
creation	O
of	O
unauthorized	O
newsgroups	O
within	O
it	O
.	O
</s>
<s>
Usenet	B-Protocol
II	I-Protocol
had	O
strictly	O
enforced	O
rules	O
.	O
</s>
<s>
Readers	O
of	O
messages	O
in	O
Usenet	B-Protocol
II	I-Protocol
had	O
to	O
be	O
fully	O
compliant	O
with	O
the	O
RFC	O
1036	O
(	O
Usenet	B-Application
)	O
standard	O
plus	O
some	O
additional	O
format	O
compliance	O
rules	O
that	O
were	O
specific	O
to	O
Usenet	B-Protocol
II	I-Protocol
.	O
</s>
<s>
It	O
was	O
required	O
to	O
have	O
an	O
NNTP-Posting-Host	O
header	O
field	O
containing	O
a	O
sound	O
site	O
.	O
</s>
<s>
Crossposts	B-Application
to	O
groups	O
outside	O
the	O
net	O
.	O
</s>
<s>
This	O
applied	O
both	O
to	O
the	O
"	O
newsgroups	O
"	O
field	O
and	O
the	O
"	O
Followup-To	B-Application
"	O
field	O
.	O
</s>
<s>
The	O
effort	O
to	O
extend	O
Usenet	B-Protocol
II	I-Protocol
was	O
abandoned	O
as	O
technical	O
means	O
to	O
fight	O
spam	B-Application
and	O
other	O
abuse	O
on	O
traditional	O
Usenet	B-Application
became	O
more	O
effective	O
and	O
spammers	O
migrated	O
from	O
Usenet	B-Application
to	O
email	O
.	O
</s>
