Page 19 - Trackpad_V5_Book 8
P. 19
PURE
FACT Bluetooth was named after the 10th century Danish king, Harald I Bluetooth.
Global Positioning System: The short form of Global
Positioning System is GPS. It is a satellite-based
navigation system which is used to identify the ground
positioning of an object. It is made up of a network of
24 satellites placed into orbit by the U.S. Department
of Defense. These are evenly spaced out so that four
satellites can be seen with a clear line of sight from
anywhere on the globe. It is used for tracking mobiles,
cars, etc.
Infrared Communication: The infrared light transmits data through the air and can propagate
throughout the room by bouncing off surfaces but will not penetrate walls. This type of
transmission uses infrared light to send data. These are similar to normal
lights, except that these have a longer wavelength. Therefore, they are
not visible to us. You can see the use of this type of transmission in
everyday life: TV remotes, automotive garage doors, wireless speakers,
etc. All of these make use of infrared light for transmission.
PROTOCOLS
Protocol is a set of rules that governs the communication between the computers on a network.
Certain network protocols and standards are to be followed in order to ensure that your computer
can communicate with another computer over a network. Some of the Internet protocols for
addressing the data transmitted over the Internet are here.
HYPERTEXT TRANSFER PROTOCOL (HTTP)
HTTP stands for Hypertext Transfer Protocol. It is the set of rules or protocols that governs the
transfer of hypertext (webpages) between two or more computers using a standard language
HTML. It is the primary protocol used to exchange data between a web browser and a website.
HYPERTEXT TRANSFER PROTOCOL SECURE (HTTPS)
HTTPS stands for Hypertext Transfer Protocol Secure. It is an extension of Hypertext Transfer
Protocol used for secure communication over a network. It makes a secure connection by
establishing an encrypting link between the browser and server, hence maintaining data integrity
by encrypting the data.
Networking Concepts 17

