KAMLA NAGAR, DELHI - 110007 ANIMATION | VFX tel. - CHANGE
KAMLA NAGAR, DELHI - 110007 ANIMATION | VFX tel. - CHANGE
KAMLA NAGAR, DELHI - 110007 ANIMATION | VFX tel. - CHANGE
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
DECEMBER 2011<br />
UPSTREAM: In computer networking,<br />
upstream refers to the direction in which data<br />
can be transferred from the client to the server<br />
(uploading). This differs greatly from<br />
downstream not only in theory and usage, but<br />
also in that upstream speeds are usually at a<br />
premium. Whereas downstream speed is<br />
important to the average home user for<br />
purposes of downloading content, uploads are<br />
used mainly for web server applications and<br />
similar processes where the sending of data is<br />
critical. Upstream speeds are also important to<br />
users of peer-to-peer software. ADSL and cable<br />
modems are asymmetric, thereby rendering the<br />
upstream speed to be much lower than that of<br />
its downstream. Symmetric connections such<br />
as SDSL and T1, however, offer identical<br />
upstream and downstream speeds.<br />
TCP: The Transmission Control Protocol<br />
(TCP) is one of the core protocols of the Internet<br />
Protocol Suite. TCP is one of the two original<br />
components of the suite, complementing the<br />
Internet Protocol (IP), and therefore the entire<br />
suite is commonly referred to as TCP/IP. TCP<br />
provides the service of exchanging data directly<br />
between two network hosts, whereas IP handles<br />
addressing and routing message across one or<br />
more networks. In particular, TCP provides<br />
reliable, ordered delivery of a stream of bytes<br />
from a program on one computer to another<br />
program on another computer. TCP is the<br />
protocol that major Internet applications rely<br />
on, applications such as the World Wide Web,<br />
e-mail, and file transfer.<br />
T CARRIER: In <strong>tel</strong>ecommunications, Tcarrier,<br />
sometimes abbreviated as T-CXR, is the<br />
generic designator for any of several digitally<br />
multiplexed <strong>tel</strong>ecommunications carrier systems<br />
originally developed by Bell Labs and used in<br />
North America, Japan, and South Korea. The<br />
basic unit of the T-carrier system is the DS0,<br />
which has a transmission rate of 64 kbit/s, and<br />
is commonly used for one voice circuit.<br />
SYNCHRONIZATION: Synchronization<br />
is timekeeping which requires the coordination<br />
of events to operate a system in unison.<br />
Systems operating with all their parts in<br />
synchrony are said to be synchronous or in<br />
sync. Some systems may be only approxima<strong>tel</strong>y<br />
synchronized, or plesiochronous. For some<br />
applications relative offsets between events<br />
need to be determined, for others only the order<br />
of the event is important. Today,<br />
synchronization can occur on a global basis due<br />
to GPS-enabled timekeeping systems.<br />
SDSL: Symmetric Digital Subscriber Line<br />
(SDSL) can have two meanings: In the wider<br />
sense it is a collection of Internet access<br />
technologies based on DSL that offer symmetric<br />
bandwidth upstream and downstream. It is<br />
considered the opposite of Asymmetric Digital<br />
Subscriber Line (ADSL) technologies where the<br />
upstream bandwidth is lower than the<br />
downstream bandwidth. In the narrow sense<br />
SDSL is a particular DSL variant that supports<br />
data only on a single line and does not support<br />
analog calls.<br />
ROOTKIT: rootkit is software that enables<br />
continued privileged access to a computer, while<br />
actively hiding its presence from administrators<br />
by subverting standard operating system<br />
functionality or other applications. Typically, a<br />
hacker installs a rootkit on a computer after first<br />
obtaining user-level access, either by exploiting<br />
a known vulnerability or cracking a password.<br />
Once a rootkit is installed, it allows an attacker<br />
to mask his intrusion and to gain privileged<br />
access to a computer by circumventing normal<br />
authentication and authorization mechanisms.<br />
Although rootkits can serve a variety of ends,<br />
they have gained notoriety primarily as malware,<br />
appropriating computing resources or stealing<br />
passwords without the knowledge of the<br />
administrators or users of affected systems.<br />
Rootkits can target firmware, a hypervisor, the<br />
kernel or most commonly, user-mode<br />
applications.<br />
BASIC RATE INTERFACE: Basic Rate<br />
Interface (BRI, 2B+D, 2B1D) is an Integrated<br />
Services Digital Network (ISDN) configuration<br />
intended primarily for use in subscriber lines<br />
similar to those that have long been used for<br />
plain old <strong>tel</strong>ephone service. BRI stands in<br />
contrast to the Primary Rate Interface (PRI)<br />
configuration which is also used in the access<br />
network but uses more robust transmission lines<br />
to carry a higher bit rate. BRI is defined in the<br />
physical layer standard I.430 produced by the<br />
International Telecommunication Union (ITU).<br />
BANDWIDTH: In computer networking<br />
and computer science, bandwidth, network<br />
bandwidth, data bandwidth or digital bandwidth<br />
is a bit rate measure of available or consumed<br />
data communication resources expressed in bits/<br />
second or multiples of it (kilobits/s, megabits/s<br />
etc). In textbooks on data transmission, digital<br />
communications, wireless communications,<br />
electronics, etc, bandwidth refers to analog<br />
signal bandwidth measured in hertz - the original<br />
meaning of the term.<br />
WiMAX: WiMAX (Worldwide<br />
Interoperability for Microwave Access) is a<br />
<strong>tel</strong>ecommunications protocol that provides fixed<br />
and fully mobile Internet access. The current<br />
WiMAX revision provides up to 40 Mbit/s with<br />
the IEEE 802.16m update expected to offer up to<br />
1 Gbit/s fixed speeds. The name “WiMAX” was<br />
created by the WiMAX Forum, which was<br />
formed in June 2001 to promote conformity and<br />
interoperability of the standard. The forum<br />
describes WiMAX as “a standards-based<br />
technology enabling the delivery of last mile<br />
wireless broadband access as an alternative to<br />
cable and DSL”<br />
3D SCANNER: A 3D scanner is a device<br />
that analyzes a real-world object or environment<br />
to collect data on its shape and possibly its<br />
appearance (i.e. color). The collected data can<br />
then be used to construct digital, three<br />
dimensional models useful for a wide variety of<br />
applications. These devices are used<br />
extensively by the entertainment industry in the<br />
production of movies and video games. Other<br />
common applications of this technology include<br />
industrial design, orthotics and prosthetics,<br />
reverse engineering and prototyping, quality<br />
control/inspection and documentation of<br />
cultural artifacts.<br />
ARCNET: ARCNET (also CamelCased as<br />
ARCnet, an acronym from Attached Resource<br />
Computer NETwork) is a local area network<br />
(LAN) protocol, similar in purpose to Ethernet<br />
or Token Ring. ARCNET was the first widely<br />
available networking system for<br />
microcomputers and became popular in the<br />
1980s for office automation tasks.<br />
ASCII: The American Standard Code for<br />
Information Interchange is a character-encoding<br />
scheme based on the ordering of the English<br />
alphabet. ASCII codes represent text in<br />
computers, communications equipment, and<br />
other devices that use text. Most modern<br />
character-encoding schemes are based on<br />
ASCII, though they support many m o r e<br />
characters than did ASCII. US-ASCII is the<br />
Internet Assigned Numbers Authority (IANA)<br />
preferred charset name for ASCII.<br />
AS: Within the Internet, an autonomous system<br />
(AS) is a collection of connected Internet<br />
Protocol (IP) routing prefixes under the control<br />
of one or more network operators that presents<br />
a common, clearly defined routing policy to the<br />
Internet.<br />
BGP: The Border Gateway Protocol (BGP) is<br />
the protocol backing the core routing decisions<br />
on the Internet. It maintains a table of IP<br />
networks or ‘prefixes’ which designate network<br />
reachability among autonomous systems (AS).<br />
It is described as a path vector protocol. BGP<br />
does not use traditional Interior Gateway<br />
Protocol (IGP) metrics, but makes routing<br />
decisions based on path, network policies and/<br />
or rulesets. For this reason, it is more<br />
appropria<strong>tel</strong>y termed a reachability protocol<br />
rather than routing protocol. BGP was created<br />
to replace the Exterior Gateway Protocol (EGP)<br />
routing protocol to allow fully decentralized<br />
routing in order to allow the removal of the<br />
NSFNet Internet backbone network.<br />
DATA LINK LAYER: The Data Link Layer<br />
is Layer 2 of the seven-layer OSI model of<br />
computer networking. It corresponds to, or is<br />
part of the link layer of the TCP/IP reference<br />
model. The Data Link Layer is the protocol layer<br />
which transfers data between adjacent network<br />
nodes in a wide area network or between nodes<br />
on the same local area network segment. The<br />
Data Link Layer provides the functional and<br />
procedural means to transfer data between<br />
network entities and might provide the means<br />
to detect and possibly correct errors that may<br />
occur in the Physical Layer. Examples of data<br />
link protocols are Ethernet for local area networks<br />
(multi-node), the Point-to-Point Protocol (PPP),<br />
HDLC and ADCCP for point-to-point (dualnode)<br />
connections.<br />
LAN: A local area network (LAN) is a computer<br />
network that connects computers and devices<br />
in a limited geographical area such as home,<br />
school, computer laboratory, office building,<br />
closely positioned group of buildings, or an<br />
airport. The defining characteristics of LANs,<br />
in contrast to wide area networks (WANs),<br />
include their usually higher data-transfer rates,<br />
smaller geographic area, and lack of a need for<br />
leased <strong>tel</strong>ecommunication lines. ARCNET, Token<br />
Ring and other technologies have been used in<br />
the past, but Ethernet over twisted pair cabling,<br />
and Wi-Fi are the two most common<br />
technologies currently in use.<br />
ISDN: Integrated Services Digital Network<br />
(ISDN) is a set of communications standards<br />
for simultaneous digital transmission of voice,<br />
video, data, and other network services over<br />
the traditional circuits of the public switched<br />
<strong>tel</strong>ephone network. communications standards<br />
for simultaneous digital transmission of voice,<br />
video, data, and other network services over<br />
the traditional circuits of the public switched<br />
<strong>tel</strong>ephone network.<br />
DOWNSTREAM: In information<br />
technology, downstream refers to the transfer<br />
speed (usually that of an internet connection)<br />
by which data can be sent from the server to the<br />
client. The process by which downstream is<br />
utilized is known as downloading.<br />
E-CARRIER: In digital <strong>tel</strong>ecommunications,<br />
where a single physical wire pair can be used to<br />
carry many simultaneous voice conversations<br />
by time-division multiplexing, worldwide<br />
standards have been created and deployed. The<br />
European Conference of Postal and<br />
Telecommunications Administrations (CEPT)<br />
originally standardized the E-carrier system,<br />
which revised and improved the earlier American<br />
T-carrier technology, and this has now been<br />
adopted by the International Telecommunication<br />
Union Telecommunication Standardization<br />
Sector (ITU-T). This is now widely used in<br />
almost all countries outside the USA, Canada<br />
and Japan.<br />
ETHERNET: Ethernet is a family of framebased<br />
computer networking technologies for<br />
local area networks (LANs). The name came from<br />
the physical concept of the ether. It defines a<br />
number of wiring and signaling standards for<br />
the Physical Layer of the OSI networking model<br />
as well as a common addressing format and<br />
Media Access Control at the Data Link Layer.<br />
Ethernet is standardized as IEEE 802.3.<br />
HSPA+: also known as Evolved High-Speed<br />
Packet Access is a wireless broadband standard<br />
defined in 3GPP release 7.<br />
IMAGE SCANNER: In computing, an<br />
image scanner—often abbreviated to just<br />
scanner— is a device that optically scans<br />
images, printed text, handwriting, or an object,<br />
and converts it to a digital image. Common<br />
examples found in offices are variations of the<br />
desktop (or flatbed) scanner where the<br />
document is placed on a glass window for<br />
scanning. Hand-held scanners, where the<br />
device is moved by hand, have evolved from<br />
text scanning “wands” to 3D scanners used for<br />
industrial design, reverse engineering, test and<br />
measurement, orthotics, gaming and other<br />
applications. Mechanically driven scanners that<br />
move the document are typically used for largeformat<br />
documents, where a flatbed design would<br />
be impractical.<br />
HTTP: The Hypertext Transfer Protocol<br />
(HTTP) is a networking protocol for distributed,<br />
collaborative, hypermedia information systems.<br />
HTTP is the foundation of data communication<br />
for the World Wide Web. HTTP functions as a<br />
request-response protocol in the client-server<br />
computing model. In HTTP, a web browser, for<br />
example, acts as a client, while an application<br />
running on a computer hosting a web site<br />
functions as a server. The client submits an<br />
HTTP request message to the server. The server,<br />
which stores content, or provides resources,<br />
such as HTML files and images, or generates<br />
such content as required, or performs other<br />
functions on behalf of the client, returns a<br />
response message to the client. A response<br />
contains completion status information about<br />
the request and may contain any content<br />
requested by the client in its message body. A<br />
client is often referred to as a user agent (UA).<br />
A web crawler (spider) is another example of a<br />
common type of client or user agent. The HTTP<br />
protocol is designed to permit intermediate<br />
network elements to improve or enable<br />
communications between clients and servers.<br />
High-traffic websites often benefit from web<br />
cache servers that deliver content on behalf of<br />
the original, so-called origin server to improve<br />
response time. HTTP proxy servers at network<br />
boundaries facilitate communication when<br />
clients without a globally routable address are<br />
located in private networks by relaying the<br />
requests and responses between clients and<br />
servers.<br />
HTTPS: https is a URI scheme that is, aside<br />
from the scheme token, syntactically identical<br />
to the http scheme used for normal HTTP<br />
connections, but which signals the browser to<br />
use an added encryption layer of SSL/TLS to<br />
protect the traffic.<br />
IP ADDRESS: The Internet Protocol (IP) is<br />
the principal communications protocol used for<br />
relaying datagrams (packets) across an<br />
internetwork using the Internet Protocol Suite.<br />
Responsible for routing packets across network<br />
boundaries, it is the primary protocol that<br />
establishes the Internet. IP is the primary<br />
protocol in the Internet Layer of the Internet<br />
Protocol Suite and has the task of delivering<br />
datagrams from the source host to the<br />
destination host solely based on their<br />
addresses. For this purpose, IP defines<br />
addressing methods and structures for datagram<br />
encapsulation.<br />
FTTx: Fiber to the x (FTTx) is a generic term<br />
for any broadband network architecture that<br />
uses optical fiber to replace all or part of the<br />
usual metal local loop used for last mile<br />
<strong>tel</strong>ecommunications.<br />
ISP: An Internet service provider (ISP), also<br />
sometimes referred to as an Internet access<br />
provider (IAP), is a company that offers its<br />
customers access to the Internet. The ISP<br />
connects to its customers using a data<br />
transmission technology appropriate for<br />
delivering Internet Protocol Paradigm, such as<br />
dial-up, DSL, cable modem, wireless or dedicated<br />
high-speed interconnects.<br />
JAVA SCRIPT:<br />
JavaScript is an implementation of the<br />
ECMAScript language standard and is typically<br />
used to enable programmatic access to<br />
computational objects within a host<br />
environment. It can be characterized as a<br />
prototype-based object-oriented scripting<br />
language that is dynamic, weakly typed and has<br />
first-class functions. It is also considered a<br />
functional programming language like Scheme<br />
and OCaml because it has closures and supports<br />
higher-order functions. JavaScript is primarily<br />
used in the form of client-side JavaScript,<br />
implemented as part of a web browser in order<br />
to provide enhanced user interfaces and<br />
dynamic websites. However, its use in<br />
applications outside web pages is also<br />
significant.<br />
DSL: Digital Subscriber Line (DSL) is a family<br />
of technologies that provides digital data<br />
transmission over the wires of a local <strong>tel</strong>ephone<br />
network. DSL originally stood for digital<br />
subscriber loop. In <strong>tel</strong>ecommunications<br />
marketing, the term Digital Subscriber Line is<br />
widely understood to mean Asymmetric Digital<br />
Subscriber Line (ADSL), the most commonly<br />
installed technical variety of DSL. DSL service<br />
is delivered simultaneously with regular<br />
<strong>tel</strong>ephone on the same <strong>tel</strong>ephone line. This is<br />
possible because DSL uses a higher frequency.<br />
These frequency bands are subsequently<br />
separated by filtering.<br />
EXTENDED ASCII: The term extended<br />
ASCII (or high ASCII) describes eight-bit or<br />
larger character encodings that include the<br />
standard seven-bit ASCII characters as well as<br />
others. The use of the term is sometimes<br />
criticized, because it can be mistakenly<br />
interpreted that the ASCII standard has been<br />
updated to include more than 128 characters or<br />
that the term unambiguously identifies a single<br />
encoding, both of which are untrue.<br />
INTERNET PROTOCOL SUITE: The<br />
Internet Protocol Suite is the set of<br />
communications protocols used for the Internet<br />
and other similar networks. It is commonly also<br />
known as TCP/IP, named from two of the most<br />
important protocols in it: the Transmission<br />
Control Protocol (TCP) and the Internet Protocol<br />
(IP), which were the first two networking<br />
protocols defined in this standard. Modern IP<br />
networking represents a synthesis of several<br />
developments that began to evolve in the 1960s<br />
and 1970s, namely the Internet and local area<br />
networks, which emerged during the 1980s,<br />
together with the advent of the World Wide Web<br />
in the early 1990s.<br />
OSI MODEL: The Open Systems<br />
Interconnection model (OSI model) is a product<br />
of the Open Systems Interconnection effort at<br />
the International Organization for<br />
Standardization. It is a way of sub-dividing a<br />
communications system into smaller parts called<br />
layers. A layer is a collection of conceptually<br />
similar functions that provide services to the<br />
layer above it and receives services from the<br />
layer below it. On each layer an instance<br />
provides services to the instances at the layer<br />
above and requests service from the layer below.<br />
Dear Readers,<br />
IF you would like to<br />
publish your work<br />
send to us and we<br />
will look at all<br />
works sent, but are<br />
subject to editing.<br />
Team Change<br />
<strong>CHANGE</strong> THE ONLY CONSTANT THING : We Bring You More Informative And Detailed Coverage Every Month 41