FA
Today, Saturday، 23 Nov 2024 - 08:53
Mokhafaf

Acronym Finder

SOA
What is SOA ?
Service-oriented architecture
The web service to implement the architectural approach to the concepts of Service-Oriented Architecture (SOA) can be implemented that is based on the simplest units of communication that the same messages are at odds with the actions (operation), which is why frequently with the name of the service, message-oriented, as they are called. The web services are provided by most software manufacturers wholesale in the world can support. unlike RPC in this model, the possibility of loose connections(loose coupling), the researcher is more because the emphasis on the CONTRACT of that WSDL has produced, rather than on the details of the field run....
REST
What is REST ?
Representational state transfer
Represented State transfer - (REST)
this model is an attempt in the direction of the descriptions or the construction, architecture, that of http, or similar protocols, are used that seek to limit the intermediary (interface) file to use apply the well-known and standard (like GET and. POST and. PUT, and. DELETE this HTTP) here more with the resources that the state flexible(State-full) are used instead of messages or operations. An architecture based on REST is REST-full, could be called to define a message of the broth from the WSDL on HTTP, to use, or can be an abstract class that merely on the soup, have been built. or can be wholly without any use of soup to be made. WSDL 2 not only connect to all the methods of Version A the Normandy does, but all the methods to connect to the http support, so it seems that for the web server, that kind of REST the run the best. every few that support this technical specification, architecture, etc. within the kit, programming the day the world is still poor. These programs are usually to the production of tools for WSDL 1 tend....
EC2
What is EC2 ?
Elastic Compute Cloud
Cloud computing, elastic Amazon...
TCP
What is TCP ?
Transmission Control Protocol
The contract guiding the transfer, or TCP, which is also the contract control the transmission or control protocol the transmission is also said to be the ... A set of protocols, a contract that is the basis for the internet.

TCP(based on IPv4) consists of four layers:

access layer to the network (Network Interface Physical)
layer connection or the internet (internet)
layer the communication is host to host or transfer (transport)
- layer Service Applications (Application)
for communication spoken by the internet, transport layer, two protocols TCP and UDP can be used. Protocol TCP data transfer with accuracy and high security can do, while the features of the UDP protocol rapid transfer of information, regardless of security issues for data transfer.

the most important task of TCP protocol ensure the accuracy of the posting information. Protocol, above, called "communication, connection oriented called. Cause this would create a virtual connection between computers, the sender and the receiver, after sending the data. Protocol, some of this type features more servants, in order to control possible errors in sending the information provided, but due to the increased load of the operational system, their performance will decrease. Protocol TCP as a protocol reliable also be remembered. To this cause, which to the knowledge of the accuracy of the information posted, etc. the information to the recipient be sent. In the event that the package information correctly has the sender put in the middle., the sender re-send the information....
FDDI
What is FDDI ?
Fiber Distributed Data Interface
F, de iPhone, with the interface distributor, data networking, fiber optics (briefly: F, Di, IP), a local area network with high speed. that from the layout (topology) of the annular speed of 100 Mbps for the exchange of Information uses. F,, ay of the two rings. so the topology of the annular dual called. In this method, F,, iPhone similar with the standard IEEE802.5 in tokens rims. One of the most important properties of f, your use of the media transfer optical fiber to exchange data. Important advantage of using optical fiber over copper wire protection and security on top of it. because in this medium the electric signal does not exist, to which it hears. In addition, the noise is also on its impact will be.

F,, ay of the two rings, which uses include: ring primary Ring Secondary. Swap the data in the ring in two opposite directions. ring the primary to send the data is used and the ring secondary when the ring primary, sliding, etc. as a backup for it, the ring goes to work. PDF, your allows connection of up to 1000 stations to the ring. meanwhile, can the length of a maximum of 200 km, spread.

the standard F, de iPhone the first time by the American National Standards Institute X3T9.5 in 1980, was then to model the Cross Connection System, Open-was presented. This Institute of writing a new standard, F, IP defined... with the standard of the current American National Standards Institute compliant....
BGP
What is BGP ?
Border Gateway Protocol
Protocol gateway border or the BJP (BGP) is a routing protocol, from the type of External is the connection between autonomous systems it provides. There are protocols of this, for access to the global internet network is essential.

the main characteristics BJP can be to feature the amount of flexibility (Scalability), it is noted. This protocol in comparison with protocols such as OS, PHP, FTP, and AIG that to the number of routers in an AS or an Area restriction. due to the lack of need for direct connection of two routers in the network, this limit does not.

The BJP contains two types of internal or iBGP, and external, or eBGP. Type external IT between the two systems independent different runs and the type of interior it is also within an autonomous system. Usually, communication between routers in a state of iBGP full mesh is established. because the law prevent the creation of loops, a router does not allow routes received through an iBGP within its iBGP release....
PPPOE
What is PPPOE ?
Point-to-Point Protocol over Ethernet
PPPOE protocol is that multiple users can simultaneously line use the internet. This protocol of combined ppp on DialUp, was used, and over ethernet, which used the same multiple on-LINE user Ethernet were formed. In fact, you main settings like username and password within your modem, enter and inside your modem Save the field and anyone with cable or wireless ( having the password Wi-Fi ) to the modem connect get can of it line the internet you could ( in order to just use multi-user now ) Because all the information inside your modem set, but the mode that that bridge were the username and password inside The that manually inside the operating system creates the money was supposed to and saved the field and to connect the rest of the users have username and password for the isp you possession had shown up, they were inside the connection, enter, they, Of course, the username and password in mode bridge your modem to the face, are visible now and could be operating abuse, too, was, though, in mode pppoe, quite the username and password visible now and the possibility of any sabotage by People the attacker's there are also....
RTSP
What is RTSP ?
Real-Time Streaming Protocol
Protocol streaming real-time stands for Artie PSP (Windows Media Video) protocol, which in the application layer is located, and its task, control data transfer for the live. Artie PSP framework for the direct transfer of data live, such as sound and image provides. Data origin can, data, Live or recorded. This protocol is the possibility to transfer multiple data using the intrauterine device. the intrauterine device Substratum, scattered or or Mississippi. At the same time, this protocol is a tool to transfer data through Artie, PHP also provides....