You are on page 1of 6

What is VAN VAN, or virtual area network, is one of a class of network types, such as the lo cal area network

(LAN), wide area network (WAN), personal area network (PAN), me tropolitan area network (MAN), and campus area network (CAN), each of which has a particular use and differs in scope and function. A VAN typically focuses on p roviding virtual face-to-face connections. --------------------------ftdma - Frequency-Time Division Multiple Access. cdma - Code division multiple access

--------------------------UUCP is an abbreviation for Unix-to-Unix Copy. The term generally refers to a su ite of computer programs and protocols allowing remote execution of commands and transfer of files, email and netnews between computers. Specifically, UUCP is o ne of the programs in the suite; it provides a user interface for requesting fil e copy operations. The UUCP suite also includes uux (user interface for remote c ommand execution), uucico (communication program), uustat (reports statistics on recent activity), uuxqt (execute commands sent from remote machines), and uunam e (reports the uucp name of the local system). Although UUCP was originally developed on and is most closely associated with Un ix, UUCP implementations exist for several other operating systems, including Mi crosoft's ms-Dos, Digital's VAX/VMS, Commodore's Amigaos, and mac os. --------------------------------EDIFACT is an international standard for EDI trading in commercial and non-comme rcial sectors. EDIFACT has an underlying syntax, which is an ISO standard. Withi n that syntax, there are directories of data elements, composite data elements, segments, and messages. There are conventions for placing messages in an "envelo pe" which identifies the sender and receiver and other attributes of a transmiss ion. For more information on the EDIFACT messaging standard, see the United Nati ons Centre for Trade Facilitation and Electronic Business Web site and click "St andards" on the left side. EDIFACT messages can be modeled using the MRM Tagged/Delimited String Format (TD S)

EDI messages consist of an envelope and a hierarchical series of structural elem ents. The envelope contains a set of headers and trailers, each set of which des cribes and contains a structural element. These structural elements are as follo ws: Interchange Group Transaction set/message Segment

Data Element Sub Element EDI message structure is similar for both X12 and EDIFACT coding. Each EDI messa ges consists of the following (from the highest level to lower levels): The hierarchical structure of an EDI message enables transaction sets/messages a nd groups to be batched. Even if an interchange contains only one transaction se t/message and only one group, that interchange is structured with the same basic structural elements that it would have if it were batched, with the exception t hat there would not be multiple transaction set/message or group elements. ===========================================

In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to an yone except those possessing special knowledge, usually referred to as a key. Th e result of the process is encrypted information (in cryptography, referred to a s ciphertext). In many contexts, the word encryption also implicitly refers to t he reverse process, decryption (e.g. software for encryption can typically also pe rform decryption), to make the encrypted information readable again (i.e. to mak e it unencrypted).

The process of decoding data that has been encrypted into a secret format. Decry ption requires a secret key or password. Encryption is the conversion of data into a form, called a ciphertext, that cann ot be easily understood by unauthorized people. Decryption is the process of con verting encrypted data back into its original form, so it can be understood.

-----------------------------------------Pretty Good Privacy (PGP) is a data encryption and decryption computer program t hat provides cryptographic privacy and authentication for data communication. PG P is often used for signing, encrypting and decrypting texts, E-mails, files, di rectories and whole disk partitions to increase the security of e-mail communica tions. It was created by Phil Zimmermann in 1991. PGP encryption uses a serial combination of hashing, data compression, symmetric -key cryptography, and, finally, public-key cryptography; each step uses one of several supported algorithms. Each public key is bound to a user name and/or an e-mail address.

-----------------------------------

---------------------------------------

A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node a ring. Data travels from node to node, with each node along the way handling e very packet. Because a ring topology provides only one pathway between any two nodes, ring ne tworks may be disrupted by the failure of a single link.[1] A node failure or ca ble break might isolate every node attached to the ring. FDDI networks overcome this vulnerability by sending data on a clockwise and a c ounterclockwise ring: in the event of a break data is wrapped back onto the comp lementary ring before it reaches the end of the cable, maintaining a path to eve ry node along the resulting "C-Ring". Many ring networks add a "counter-rotating ring" to form a redundant topology. S uch "dual ring" networks include Spatial Reuse Protocol, Fiber Distributed Data Interface (FDDI), and Resilient Packet Ring.

Advantages Very orderly network where every device has access to the token and the oppo rtunity to transmit Performs better than a bus topology under heavy network load Does not require network server to manage the connectivity between the compu ters No need to switch on all the computers to work with the network

Disadvantages One malfunctioning workstation or bad port in the MAU can create problems fo r the entire network Moves, adds and changes of devices can affect the network Network adapter cards and MAU's are much more expensive than Ethernet cards and hubs Much slower than an Ethernet network under normal load

-------------------------------------------

he Hypertext Transfer Protocol (HTTP) is a networking protocol for distributed, collaborative, hypermedia information systems.[1] HTTP is the foundation of data communication for the World Wide Web. The standards development of HTTP has been coordinated by the Internet Engineeri ng Task Force (IETF) and the World Wide Web Consortium (W3C), culminating in the publication of a series of Requests for Comments (RFCs), most notably RFC 2616 (June 1999), which defines HTTP/1.1, the version of HTTP in common use.

HTTP functions as a request-response protocol in the client-server computing mod el. In HTTP, a web browser, for example, acts as a client, while an application running on a computer hosting a web site functions as a server. The client submi ts an HTTP request message to the server. The server, which stores content, or p rovides resources, such as HTML files, or performs other functions on behalf of the client, returns a response message to the client. A response contains comple tion status information about the request and may contain any content requested by the client in its message body. A client is often referred to as a user agent (UA). As well as web browsers, web crawlers are another common user agent. These include the indexing software use d by search providers. Voice browsers are another less common but important clas s of user agent. The HTTP protocol is designed to permit intermediate network elements to improve or enable communications between clients and servers. High-traffic websites oft en benefit from web cache servers that deliver content on behalf of the original , so-called origin server to improve response time. HTTP proxy servers at networ k boundaries facilitate communication when clients without a globally routable a ddress are located in private networks by relaying the requests and responses be tween clients and servers. HTTP is an Application Layer protocol designed within the framework of the Inter net Protocol Suite. The protocol definitions presume a reliable Transport Layer protocol for host-to-host data transfer.[2] The Transmission Control Protocol (T CP) is the dominant protocol in use for this purpose. However, HTTP has found ap plication even with unreliable protocols, such as the User Datagram Protocol (UD P) in methods such as the Simple Service Discovery Protocol (SSDP). HTTP Resources are identified and located on the network by Uniform Resource Ide ntifiers (URIs) or, more specifically, Uniform Resource Locators (URLs) using the ht tp or https URI schemes. URIs and the Hypertext Markup Language (HTML), form a s ystem of inter-linked resources, called hypertext documents, on the Internet, th at led to the establishment of the World Wide Web in 1990 by English physicist T im Berners-Lee. The original version of HTTP (HTTP/1.0) was revised in HTTP/1.1. HTTP/1.0 uses a separate connection to the same server for every request-response transaction, while HTTP/1.1 can reuse a connection multiple times, to download, for instance, images for a just delivered page. Hence HTTP/1.1 communications experience less latency as the establishment of TCP connections presents considerable overhead.

-----------------------------------------------------------

HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (t ext, graphic images, sound, video, and other multimedia files) on the World Wide Web. As soon as a Web user opens their Web browser, the user is indirectly maki ng use of HTTP. HTTP is an application protocol that runs on top of the TCP/IP s uite of protocols (the foundation protocols for the Internet). HTTP concepts include (as the Hypertext part of the name implies) the idea that files can contain references to other files whose selection will elicit

additional transfer requests. Any Web server machine contains, in addition to th e Web page files it can serve, an HTTP daemon, a program that is designed to wai t for HTTP requests and handle them when they arrive. Your Web browser is an HTT P client, sending requests to server machines. When the browser user enters file requests by either "opening" a Web file (typing in a Uniform Resource Locator o r URL) or clicking on a hypertext link, the browser builds an HTTP request and s ends it to the Internet Protocol address (IP address) indicated by the URL. The HTTP daemon in the destination server machine receives the request and sends bac k the requested file or files associated with the request. (A Web page often con sists of more than one file.)

Definition: HTTP - the Hypertext Transfer Protocol - provides a standard for Web browsers and servers to communicate. The definition of HTTP is a technical spec ification of a network protocol that software must implement. HTTP is an application layer network protocol built on top of TCP. HTTP clients (such as Web browsers) and servers communicate via HTTP request and response mes sages. The three main HTTP message types are GET, POST, and HEAD. HTTP utilizes TCP port 80 by default, though other ports such as 8080 can altern atively be used.

The current version of HTTP in widespread use - HTTP version 1.1 - was developed to address some of the performance limitations of the original version - HTTP 1 .0. HTTP 1.1 is documented in RFC 2068.

---------------------------------------------------

ATM Technology ATM is a switched, connection-oriented networking technology that provides dedic ated, high-speed connections to virtually an unlimited number of users. It operates on a cell-based fast-packet communication method that supports transfer rates from 1.544 Mbps to 10 Gbps. Dedicated media connections running in parallel allow an ATM switch to simultane ously support multiple conversations, eliminating the bandwidth contention and data bo ttlenecks found on shared-media networks such as Ethernet, Token Ring and FDDI. When Data is transferred in an ATM network, a switched virtual circuit (SVC) is established between the sender and receiver. The information is converted into fixed-length cells, which are transmitted through the network and reassembled into data packets at the des tination. ATM relies on the reliability of digital lines to ensure data integrity and does not use error-correction protocols. Numerous transmissions can take place at once, enabl ing ATM to accommodate multiple dialogues quickly, easily and reliably. ATM's dedicated bandwidth is capable of easily supporting data-intensive applica tions such as high-resolution computer graphics, large data-base management systems and hig h-end engineering packages. The technology's high throughput and real-time information delivery also make it a perfect solution for emerging multimedia applications combining d ata, voice and animation. ATM can be installed into an existing network as needed without upgrading the en tire LAN!

You might also like