Page 19 - Trackpad_V1_Book 8_Flipbook
P. 19
PURE
FACT Bluetooth was named after the 10th century Danish king, Harald I Bluetooth.
Global Positioning System: The short form of Global
Positioning System is GPS. It is a satellite-based
navigation system that is used to identify the ground
positioning of an object. It is made up of a network
of 24 satellites placed into orbit by the U.S.
Department of Defense. These are evenly spaced
out so that four satellites can be seen with a clear
line of sight from anywhere on the globe. It is used
for tracking mobiles, cars, etc.
Infrared Communication: The infrared light transmits data through the air and can
propagate throughout the room by bouncing off surfaces but will not
penetrate walls. This type of transmission uses infrared light to send
data. These are similar to normal lights, except that they have a longer
wavelength. Therefore, they are not visible to us. You can see the use
of this type of transmission in everyday life: TV remotes, automotive
garage doors, wireless speakers, etc. All of these make use of infrared
light for transmission.
PROTOCOLS
Protocols are a set of rules that governs the communication between the computers on a network.
Certain network protocols and standards are to be followed in order to ensure that your computer
can communicate with another computer over a network. Some of the Internet protocols for
addressing the data transmitted over the Internet are here.
HYPERTEXT TRANSFER PROTOCOL (HTTP)
HTTP stands for Hypertext Transfer Protocol. It is the set of rules or protocols that govern the
transfer of hypertext (webpages) between two or more computers using a standard language
HTML. It is the primary protocol used to exchange data between a web browser and a website.
HYPERTEXT TRANSFER PROTOCOL SECURE (HTTPS)
HTTPS stands for Hypertext Transfer Protocol Secure. It is an extension of the HyperText Transfer
Protocol used for secure communication over a network. It makes a secure connection by
establishing an encrypting link between the browser and server, hence maintaining data integrity
by encrypting the data.
Networking Concepts 17

