27.12.2012 Views

KAMLA NAGAR, DELHI - 110007 ANIMATION | VFX tel. - CHANGE

KAMLA NAGAR, DELHI - 110007 ANIMATION | VFX tel. - CHANGE

KAMLA NAGAR, DELHI - 110007 ANIMATION | VFX tel. - CHANGE

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DECEMBER 2011<br />

UPSTREAM: In computer networking,<br />

upstream refers to the direction in which data<br />

can be transferred from the client to the server<br />

(uploading). This differs greatly from<br />

downstream not only in theory and usage, but<br />

also in that upstream speeds are usually at a<br />

premium. Whereas downstream speed is<br />

important to the average home user for<br />

purposes of downloading content, uploads are<br />

used mainly for web server applications and<br />

similar processes where the sending of data is<br />

critical. Upstream speeds are also important to<br />

users of peer-to-peer software. ADSL and cable<br />

modems are asymmetric, thereby rendering the<br />

upstream speed to be much lower than that of<br />

its downstream. Symmetric connections such<br />

as SDSL and T1, however, offer identical<br />

upstream and downstream speeds.<br />

TCP: The Transmission Control Protocol<br />

(TCP) is one of the core protocols of the Internet<br />

Protocol Suite. TCP is one of the two original<br />

components of the suite, complementing the<br />

Internet Protocol (IP), and therefore the entire<br />

suite is commonly referred to as TCP/IP. TCP<br />

provides the service of exchanging data directly<br />

between two network hosts, whereas IP handles<br />

addressing and routing message across one or<br />

more networks. In particular, TCP provides<br />

reliable, ordered delivery of a stream of bytes<br />

from a program on one computer to another<br />

program on another computer. TCP is the<br />

protocol that major Internet applications rely<br />

on, applications such as the World Wide Web,<br />

e-mail, and file transfer.<br />

T CARRIER: In <strong>tel</strong>ecommunications, Tcarrier,<br />

sometimes abbreviated as T-CXR, is the<br />

generic designator for any of several digitally<br />

multiplexed <strong>tel</strong>ecommunications carrier systems<br />

originally developed by Bell Labs and used in<br />

North America, Japan, and South Korea. The<br />

basic unit of the T-carrier system is the DS0,<br />

which has a transmission rate of 64 kbit/s, and<br />

is commonly used for one voice circuit.<br />

SYNCHRONIZATION: Synchronization<br />

is timekeeping which requires the coordination<br />

of events to operate a system in unison.<br />

Systems operating with all their parts in<br />

synchrony are said to be synchronous or in<br />

sync. Some systems may be only approxima<strong>tel</strong>y<br />

synchronized, or plesiochronous. For some<br />

applications relative offsets between events<br />

need to be determined, for others only the order<br />

of the event is important. Today,<br />

synchronization can occur on a global basis due<br />

to GPS-enabled timekeeping systems.<br />

SDSL: Symmetric Digital Subscriber Line<br />

(SDSL) can have two meanings: In the wider<br />

sense it is a collection of Internet access<br />

technologies based on DSL that offer symmetric<br />

bandwidth upstream and downstream. It is<br />

considered the opposite of Asymmetric Digital<br />

Subscriber Line (ADSL) technologies where the<br />

upstream bandwidth is lower than the<br />

downstream bandwidth. In the narrow sense<br />

SDSL is a particular DSL variant that supports<br />

data only on a single line and does not support<br />

analog calls.<br />

ROOTKIT: rootkit is software that enables<br />

continued privileged access to a computer, while<br />

actively hiding its presence from administrators<br />

by subverting standard operating system<br />

functionality or other applications. Typically, a<br />

hacker installs a rootkit on a computer after first<br />

obtaining user-level access, either by exploiting<br />

a known vulnerability or cracking a password.<br />

Once a rootkit is installed, it allows an attacker<br />

to mask his intrusion and to gain privileged<br />

access to a computer by circumventing normal<br />

authentication and authorization mechanisms.<br />

Although rootkits can serve a variety of ends,<br />

they have gained notoriety primarily as malware,<br />

appropriating computing resources or stealing<br />

passwords without the knowledge of the<br />

administrators or users of affected systems.<br />

Rootkits can target firmware, a hypervisor, the<br />

kernel or most commonly, user-mode<br />

applications.<br />

BASIC RATE INTERFACE: Basic Rate<br />

Interface (BRI, 2B+D, 2B1D) is an Integrated<br />

Services Digital Network (ISDN) configuration<br />

intended primarily for use in subscriber lines<br />

similar to those that have long been used for<br />

plain old <strong>tel</strong>ephone service. BRI stands in<br />

contrast to the Primary Rate Interface (PRI)<br />

configuration which is also used in the access<br />

network but uses more robust transmission lines<br />

to carry a higher bit rate. BRI is defined in the<br />

physical layer standard I.430 produced by the<br />

International Telecommunication Union (ITU).<br />

BANDWIDTH: In computer networking<br />

and computer science, bandwidth, network<br />

bandwidth, data bandwidth or digital bandwidth<br />

is a bit rate measure of available or consumed<br />

data communication resources expressed in bits/<br />

second or multiples of it (kilobits/s, megabits/s<br />

etc). In textbooks on data transmission, digital<br />

communications, wireless communications,<br />

electronics, etc, bandwidth refers to analog<br />

signal bandwidth measured in hertz - the original<br />

meaning of the term.<br />

WiMAX: WiMAX (Worldwide<br />

Interoperability for Microwave Access) is a<br />

<strong>tel</strong>ecommunications protocol that provides fixed<br />

and fully mobile Internet access. The current<br />

WiMAX revision provides up to 40 Mbit/s with<br />

the IEEE 802.16m update expected to offer up to<br />

1 Gbit/s fixed speeds. The name “WiMAX” was<br />

created by the WiMAX Forum, which was<br />

formed in June 2001 to promote conformity and<br />

interoperability of the standard. The forum<br />

describes WiMAX as “a standards-based<br />

technology enabling the delivery of last mile<br />

wireless broadband access as an alternative to<br />

cable and DSL”<br />

3D SCANNER: A 3D scanner is a device<br />

that analyzes a real-world object or environment<br />

to collect data on its shape and possibly its<br />

appearance (i.e. color). The collected data can<br />

then be used to construct digital, three<br />

dimensional models useful for a wide variety of<br />

applications. These devices are used<br />

extensively by the entertainment industry in the<br />

production of movies and video games. Other<br />

common applications of this technology include<br />

industrial design, orthotics and prosthetics,<br />

reverse engineering and prototyping, quality<br />

control/inspection and documentation of<br />

cultural artifacts.<br />

ARCNET: ARCNET (also CamelCased as<br />

ARCnet, an acronym from Attached Resource<br />

Computer NETwork) is a local area network<br />

(LAN) protocol, similar in purpose to Ethernet<br />

or Token Ring. ARCNET was the first widely<br />

available networking system for<br />

microcomputers and became popular in the<br />

1980s for office automation tasks.<br />

ASCII: The American Standard Code for<br />

Information Interchange is a character-encoding<br />

scheme based on the ordering of the English<br />

alphabet. ASCII codes represent text in<br />

computers, communications equipment, and<br />

other devices that use text. Most modern<br />

character-encoding schemes are based on<br />

ASCII, though they support many m o r e<br />

characters than did ASCII. US-ASCII is the<br />

Internet Assigned Numbers Authority (IANA)<br />

preferred charset name for ASCII.<br />

AS: Within the Internet, an autonomous system<br />

(AS) is a collection of connected Internet<br />

Protocol (IP) routing prefixes under the control<br />

of one or more network operators that presents<br />

a common, clearly defined routing policy to the<br />

Internet.<br />

BGP: The Border Gateway Protocol (BGP) is<br />

the protocol backing the core routing decisions<br />

on the Internet. It maintains a table of IP<br />

networks or ‘prefixes’ which designate network<br />

reachability among autonomous systems (AS).<br />

It is described as a path vector protocol. BGP<br />

does not use traditional Interior Gateway<br />

Protocol (IGP) metrics, but makes routing<br />

decisions based on path, network policies and/<br />

or rulesets. For this reason, it is more<br />

appropria<strong>tel</strong>y termed a reachability protocol<br />

rather than routing protocol. BGP was created<br />

to replace the Exterior Gateway Protocol (EGP)<br />

routing protocol to allow fully decentralized<br />

routing in order to allow the removal of the<br />

NSFNet Internet backbone network.<br />

DATA LINK LAYER: The Data Link Layer<br />

is Layer 2 of the seven-layer OSI model of<br />

computer networking. It corresponds to, or is<br />

part of the link layer of the TCP/IP reference<br />

model. The Data Link Layer is the protocol layer<br />

which transfers data between adjacent network<br />

nodes in a wide area network or between nodes<br />

on the same local area network segment. The<br />

Data Link Layer provides the functional and<br />

procedural means to transfer data between<br />

network entities and might provide the means<br />

to detect and possibly correct errors that may<br />

occur in the Physical Layer. Examples of data<br />

link protocols are Ethernet for local area networks<br />

(multi-node), the Point-to-Point Protocol (PPP),<br />

HDLC and ADCCP for point-to-point (dualnode)<br />

connections.<br />

LAN: A local area network (LAN) is a computer<br />

network that connects computers and devices<br />

in a limited geographical area such as home,<br />

school, computer laboratory, office building,<br />

closely positioned group of buildings, or an<br />

airport. The defining characteristics of LANs,<br />

in contrast to wide area networks (WANs),<br />

include their usually higher data-transfer rates,<br />

smaller geographic area, and lack of a need for<br />

leased <strong>tel</strong>ecommunication lines. ARCNET, Token<br />

Ring and other technologies have been used in<br />

the past, but Ethernet over twisted pair cabling,<br />

and Wi-Fi are the two most common<br />

technologies currently in use.<br />

ISDN: Integrated Services Digital Network<br />

(ISDN) is a set of communications standards<br />

for simultaneous digital transmission of voice,<br />

video, data, and other network services over<br />

the traditional circuits of the public switched<br />

<strong>tel</strong>ephone network. communications standards<br />

for simultaneous digital transmission of voice,<br />

video, data, and other network services over<br />

the traditional circuits of the public switched<br />

<strong>tel</strong>ephone network.<br />

DOWNSTREAM: In information<br />

technology, downstream refers to the transfer<br />

speed (usually that of an internet connection)<br />

by which data can be sent from the server to the<br />

client. The process by which downstream is<br />

utilized is known as downloading.<br />

E-CARRIER: In digital <strong>tel</strong>ecommunications,<br />

where a single physical wire pair can be used to<br />

carry many simultaneous voice conversations<br />

by time-division multiplexing, worldwide<br />

standards have been created and deployed. The<br />

European Conference of Postal and<br />

Telecommunications Administrations (CEPT)<br />

originally standardized the E-carrier system,<br />

which revised and improved the earlier American<br />

T-carrier technology, and this has now been<br />

adopted by the International Telecommunication<br />

Union Telecommunication Standardization<br />

Sector (ITU-T). This is now widely used in<br />

almost all countries outside the USA, Canada<br />

and Japan.<br />

ETHERNET: Ethernet is a family of framebased<br />

computer networking technologies for<br />

local area networks (LANs). The name came from<br />

the physical concept of the ether. It defines a<br />

number of wiring and signaling standards for<br />

the Physical Layer of the OSI networking model<br />

as well as a common addressing format and<br />

Media Access Control at the Data Link Layer.<br />

Ethernet is standardized as IEEE 802.3.<br />

HSPA+: also known as Evolved High-Speed<br />

Packet Access is a wireless broadband standard<br />

defined in 3GPP release 7.<br />

IMAGE SCANNER: In computing, an<br />

image scanner—often abbreviated to just<br />

scanner— is a device that optically scans<br />

images, printed text, handwriting, or an object,<br />

and converts it to a digital image. Common<br />

examples found in offices are variations of the<br />

desktop (or flatbed) scanner where the<br />

document is placed on a glass window for<br />

scanning. Hand-held scanners, where the<br />

device is moved by hand, have evolved from<br />

text scanning “wands” to 3D scanners used for<br />

industrial design, reverse engineering, test and<br />

measurement, orthotics, gaming and other<br />

applications. Mechanically driven scanners that<br />

move the document are typically used for largeformat<br />

documents, where a flatbed design would<br />

be impractical.<br />

HTTP: The Hypertext Transfer Protocol<br />

(HTTP) is a networking protocol for distributed,<br />

collaborative, hypermedia information systems.<br />

HTTP is the foundation of data communication<br />

for the World Wide Web. HTTP functions as a<br />

request-response protocol in the client-server<br />

computing model. In HTTP, a web browser, for<br />

example, acts as a client, while an application<br />

running on a computer hosting a web site<br />

functions as a server. The client submits an<br />

HTTP request message to the server. The server,<br />

which stores content, or provides resources,<br />

such as HTML files and images, or generates<br />

such content as required, or performs other<br />

functions on behalf of the client, returns a<br />

response message to the client. A response<br />

contains completion status information about<br />

the request and may contain any content<br />

requested by the client in its message body. A<br />

client is often referred to as a user agent (UA).<br />

A web crawler (spider) is another example of a<br />

common type of client or user agent. The HTTP<br />

protocol is designed to permit intermediate<br />

network elements to improve or enable<br />

communications between clients and servers.<br />

High-traffic websites often benefit from web<br />

cache servers that deliver content on behalf of<br />

the original, so-called origin server to improve<br />

response time. HTTP proxy servers at network<br />

boundaries facilitate communication when<br />

clients without a globally routable address are<br />

located in private networks by relaying the<br />

requests and responses between clients and<br />

servers.<br />

HTTPS: https is a URI scheme that is, aside<br />

from the scheme token, syntactically identical<br />

to the http scheme used for normal HTTP<br />

connections, but which signals the browser to<br />

use an added encryption layer of SSL/TLS to<br />

protect the traffic.<br />

IP ADDRESS: The Internet Protocol (IP) is<br />

the principal communications protocol used for<br />

relaying datagrams (packets) across an<br />

internetwork using the Internet Protocol Suite.<br />

Responsible for routing packets across network<br />

boundaries, it is the primary protocol that<br />

establishes the Internet. IP is the primary<br />

protocol in the Internet Layer of the Internet<br />

Protocol Suite and has the task of delivering<br />

datagrams from the source host to the<br />

destination host solely based on their<br />

addresses. For this purpose, IP defines<br />

addressing methods and structures for datagram<br />

encapsulation.<br />

FTTx: Fiber to the x (FTTx) is a generic term<br />

for any broadband network architecture that<br />

uses optical fiber to replace all or part of the<br />

usual metal local loop used for last mile<br />

<strong>tel</strong>ecommunications.<br />

ISP: An Internet service provider (ISP), also<br />

sometimes referred to as an Internet access<br />

provider (IAP), is a company that offers its<br />

customers access to the Internet. The ISP<br />

connects to its customers using a data<br />

transmission technology appropriate for<br />

delivering Internet Protocol Paradigm, such as<br />

dial-up, DSL, cable modem, wireless or dedicated<br />

high-speed interconnects.<br />

JAVA SCRIPT:<br />

JavaScript is an implementation of the<br />

ECMAScript language standard and is typically<br />

used to enable programmatic access to<br />

computational objects within a host<br />

environment. It can be characterized as a<br />

prototype-based object-oriented scripting<br />

language that is dynamic, weakly typed and has<br />

first-class functions. It is also considered a<br />

functional programming language like Scheme<br />

and OCaml because it has closures and supports<br />

higher-order functions. JavaScript is primarily<br />

used in the form of client-side JavaScript,<br />

implemented as part of a web browser in order<br />

to provide enhanced user interfaces and<br />

dynamic websites. However, its use in<br />

applications outside web pages is also<br />

significant.<br />

DSL: Digital Subscriber Line (DSL) is a family<br />

of technologies that provides digital data<br />

transmission over the wires of a local <strong>tel</strong>ephone<br />

network. DSL originally stood for digital<br />

subscriber loop. In <strong>tel</strong>ecommunications<br />

marketing, the term Digital Subscriber Line is<br />

widely understood to mean Asymmetric Digital<br />

Subscriber Line (ADSL), the most commonly<br />

installed technical variety of DSL. DSL service<br />

is delivered simultaneously with regular<br />

<strong>tel</strong>ephone on the same <strong>tel</strong>ephone line. This is<br />

possible because DSL uses a higher frequency.<br />

These frequency bands are subsequently<br />

separated by filtering.<br />

EXTENDED ASCII: The term extended<br />

ASCII (or high ASCII) describes eight-bit or<br />

larger character encodings that include the<br />

standard seven-bit ASCII characters as well as<br />

others. The use of the term is sometimes<br />

criticized, because it can be mistakenly<br />

interpreted that the ASCII standard has been<br />

updated to include more than 128 characters or<br />

that the term unambiguously identifies a single<br />

encoding, both of which are untrue.<br />

INTERNET PROTOCOL SUITE: The<br />

Internet Protocol Suite is the set of<br />

communications protocols used for the Internet<br />

and other similar networks. It is commonly also<br />

known as TCP/IP, named from two of the most<br />

important protocols in it: the Transmission<br />

Control Protocol (TCP) and the Internet Protocol<br />

(IP), which were the first two networking<br />

protocols defined in this standard. Modern IP<br />

networking represents a synthesis of several<br />

developments that began to evolve in the 1960s<br />

and 1970s, namely the Internet and local area<br />

networks, which emerged during the 1980s,<br />

together with the advent of the World Wide Web<br />

in the early 1990s.<br />

OSI MODEL: The Open Systems<br />

Interconnection model (OSI model) is a product<br />

of the Open Systems Interconnection effort at<br />

the International Organization for<br />

Standardization. It is a way of sub-dividing a<br />

communications system into smaller parts called<br />

layers. A layer is a collection of conceptually<br />

similar functions that provide services to the<br />

layer above it and receives services from the<br />

layer below it. On each layer an instance<br />

provides services to the instances at the layer<br />

above and requests service from the layer below.<br />

Dear Readers,<br />

IF you would like to<br />

publish your work<br />

send to us and we<br />

will look at all<br />

works sent, but are<br />

subject to editing.<br />

Team Change<br />

<strong>CHANGE</strong> THE ONLY CONSTANT THING : We Bring You More Informative And Detailed Coverage Every Month 41

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!