Network transparency
online transparency tool, network transparencyNetwork transparency in its most general sense refers to the ability of a protocol to transmit data over the network in a manner which is transparent invisible to those using the applications that are using the protocol
Contents
- 1 X Window
- 2 Databases
- 3 Firewalls
- 4 See also
- 5 References
X Windowedit
The term is often partially correctly applied in the context of the X Window System, which is able to transmit graphical data over the network and integrate it seamlessly with applications running and displaying locally; however, certain extensions of the X Window System are not capable of working over the network1
Databasesedit
In a centralized database system, the only available resource that needs to be shielded from the user is the data that is, the storage system In a distributed DBMS, a second resource needs to be managed in much the same manner: the network Preferably, the user should be protected from the network operational details Then there would be no difference between database applications that would run on the centralized database and those that would run on a distributed one This kind of transparency is referred to as network transparency or distribution transparency From a database management system DBMS perspective, distribution transparency requires that users do not have to specify where data is located
Some have separated distribution transparency into location transparency and naming transparency
Location transparency in commands used to perform a task is independent both of the locations of the data, and of the system on which an operation is carried out
Naming transparency means that a unique name is provided for each object in the database
Firewallsedit
See also: Proxy server § Transparent proxyTransparency in firewall technology can be defined at the networking IP or Internet layer or at the application layer
Transparency at the IP layer means the client targets the real IP address of the server If a connection is non-transparent, then the client targets an intermediate host address, which could be a proxy or a caching server IP layer transparency could be also defined from the point of server's view If the connection is transparent, the server sees the real client IP If it is non-transparent, the server sees the IP of the intermediate host
Transparency at the application layer means the client application uses the protocol in a different way An example of a transparent HTTP request for a server:
GET / HTTP/11 Host: exampleorg Connection: Keep-AliveAn example non-transparent HTTP request for a proxy cache:
GET http://foobar/ HTTP/11 Proxy-Connection: Keep-AliveApplication layer transparency is symmetric when the same working mode is used on both the sides The transparency is asymmetric when the firewall usually a proxy converts server type requests to proxy type or vice versa
Transparency at the IP layer does not mean automatically application layer transparency
See alsoedit
- Computer networking portal
- Data independence
- Replication transparency
Referencesedit
- ^ "The Wayland Situation: Facts About X vs Wayland Phoronix" LWNnet 23 June 2013
network transparency, network transparency coeo solutions, online transparency, online transparency editor, online transparency image, online transparency image editor, online transparency maker, online transparency tool, private transparency and network transparency, tv transparency
Network transparency Information about

-
Network transparency beatiful post thanks!
29.10.2014
Network transparency
Network transparency
Network transparency viewing the topic.
There are excerpts from wikipedia on this article and video
Random Posts
IP address blocking
IP address blocking prevents connection between a server or website and certain IP addresses or rang...Gisele Bündchen
Gisele Caroline Bündchen1 Portuguese pronunciation: ʒiˈzɛli kaɾoˈlini ˈbĩtʃẽj, German pronuncia...Sheldon, West Midlands
Sheldon is an area of east Birmingham, England Historically part of Warwickshire, it is close to the...Beverly, Chicago
Beverly is one of the 77 community areas of Chicago, Illinois It is located on the South Side on the...Search Engine
Our site has a system which serves search engine function.
You can search all data in our system with above button which written "What did you look for? "
Welcome to our simple, stylish and fast search engine system.
We have prepared this method why you can reach most accurate and most up to date knowladge.
The search engine that developed for you transmits you to the latest and exact information with its basic and quick system.
You can find nearly everything data which found from internet with this system.
Random Posts
The San Francisco Examiner
The San Francisco Examiner is a longtime daily newspaper distributed in and around San Francisco, Ca...Frederator Films
Frederator Films is an animation studio founded by Fred Seibert as part of Frederator Studios, with ...John Hasbrouck Van Vleck
John Hasbrouck Van Vleck March 13, 1899 – October 27, 1980 was an American physicist and mathematici...Christian Lacroix
Christian Marie Marc Lacroix French pronunciation: kʁistjɑ̃ lakʁwa; born 16 May 1951 is a Fren...© Copyright © 2014. Search Engine