Serial Converters
|
|
In the context of RSxxx serial communication, Serial Converters
can be used to change the electrical characteristic of one communications
standard into another, to take advantage of the best properties
of the alternate standard selected.
For example, an Automatic RS232<=>RS485 converter, could
be connected to a computer's RS232, full-duplex port, and transform
it into an RS485 half-duplex, multi-drop network at distances up
to 4000ft. |
|
|
|
|
|
Server
|
|
Server is a computer or device on a network that manages network
resources. For example, a file server is a computer and storage
device dedicated to storing files. Any user on the network can store
files on the server. A print server is a computer that manages one
or more printers, and a network server is a computer that manages
network traffic. A database server is a computer system that processes
database queries.
|
|
|
|
|
|
Server farm
|
|
A server farm is a group of computers acting as servers and
housed together in a single location. In other words, server farm
is a group of networked servers that are housed in one location.
A server farm is sometimes called a server cluster. |
|
|
|
|
|
SMTP
|
|
SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used
in sending and receiving e-mail. However, since it's limited in
its ability to queue messages at the receiving end, it's usually
used with one of two other protocols, POP3 or Internet Message Access
Protocol. For more information, please refer to this page http://www.networksorcery.com/enp/protocol/smtp.htm
|
|
|
|
|
|
|
|
SSH
|
|
SSH (Secure Shell) is a program to log into another computer
over a network, to execute commands in a remote machine, and to
move files from one machine to another. It provides strong authentication
and secure communications over insecure channels.
Secure Shell (SSH), sometimes known as Secure Socket Shell, is
a UNIX-based command interface and protocol for securely getting
access to a remote computer.
It is widely used by network administrators to control Web and
other kinds of servers remotely.
SSH (Secure Shell) is a popular, robust, TCP/IP-based product for
network security and privacy, supporting strong encryption and authentication.
For more information, please refer to this page http://www.networksorcery.com/enp/protocol/ssh.htm
|
|
|
|
|
|
SSL
|
|
SSL (Secure Sockets Layer) is a protocol developed by Netscape
for transmitting private documents via the Internet. SSL works by
using a public key to encrypt data that's transferred over the SSL
connection. Both Netscape Navigator and Internet Explorer support
SSL, and many Web sites use the protocol to obtain confidential
user information, such as credit card numbers. By convention, URLs
that require an SSL connection start with https: instead of http:.
For more information, please refer to this page http://developer.netscape.com/docs/manuals/security/sslin/contents.htm
|
|
|
|
|
|
Stop bit
|
|
In asynchronous communications, a bit that indicates that a
byte has just been transmitted. Every byte of data is preceded by
a start bit and followed by a stop bit.
|
|
|
|
|
|
Supercomputer
|
|
Supercomputer is the fastest type of computer. Supercomputers
are very expensive and are employed for specialized applications
that require immense amounts of mathematical calculations. For example,
weather forecasting requires a supercomputer. Other uses of supercomputers
include animated graphics, fluid dynamic calculations, nuclear energy
research, and petroleum exploration.
|
|
|
|
|
|
Switch
|
|
In telecommunications, a switch is a network device that selects
a path or circuit for sending a unit of data to its next destination.
A switch may also include the function of the router, a device or
program that can determine the route and specifically what adjacent
network point the data should be sent to. In general, a switch is
a simpler and faster mechanism than a router. Router requires knowledge
about the network and how to determine the route, whereas switch
doesn't.
|
|
|
|
|
|
Synchronous
|
|
Occurring at regular intervals. Most communication between computers
and devices is asynchronous Communication within a computer, however,
is usually synchronous and is governed by the microprocessor clock.
|
|
|
|
|
|
Synchronous data transfer
|
|
In program-to-program communication, synchronous communication
requires that each end of an exchange of communication respond in
turn without initiating a new communication. A typical activity
that might use a synchronous protocol would be a transmission of
files from one point to another. As each transmission is received,
a response is returned indicating success or the need to resend.
|
|
|
|
|