Free Essay

Domain Name Systems, Iris and Email Addresses

In:

Submitted By liunoo
Words 565
Pages 3
Why Internationalization?
With the Internet fast speed developing, more and more people aware of the importance of Internet. I am sure that everybody may very familiar with web addresses, which are used to indicate resources on the web. Traditional web addresses are formed by only ASCII characters, such as a-z, A-Z, and so on. Nowadays, a multilingual web address is showing up on the internet, this kind of web address are not just containing ASCII characters, it could be formed by all kind of Unicode, such as Chinese language, Russia languages. But how could this happen? How does it work? Following I will illustrate these issues in details.
Traditional web addresses are represented by uniform resource identifiers, which is URI in short. RFC 3986, the generic syntax for URI, defines a grammar that is a superset of all valid URIs, allowing an implantation to parse the common components of a URI reference. The characters that RFC 3986 allowed are only English languages, European numerals and a small number of symbols. This explains why traditional web addresses could only be formed by ASCIIs. In order to satisfy users could use their native languages in web addresses, here comes another identifier, Internationalized Resource Identifiers, which making URI system more worldly and accessible.

Previous Knowledge---Uniform Resource Identifiers
Uniform Resource Identifiers, which also called URI, are used for expressing traditional web addresses. Web addresses indicated by URI are limited to only ASCII characters, such as lower and upper A to Z letters, and some symbols.

Brief Introduction to IRI
International Resource Identifiers is a superset of URI; it is a sequence of characters from the Universal Character Set, not only ASCII character set. RFC 3987, the syntax for IRI, this kind of approach defining a new protocol element was chosen instead of extending or changing the definition of URIs. This was done in order to allow a clear distinction and to avoid incompatibilities with existing software.
For a simple IRI, it always contains three parts, the scheme, the domain name and the path that point to the location of the resource. Such as Figure 1 shows to us and following we will focus on the solutions for domain names.
Figure 1:

Internationalized Domain Names---IDN
Internationalized Domain Names, such as 华人.公司.cn, is an Internet domain name that contains at least one label that is displayed in software applications. Internationalized domain names are stored in the Domain Name System as ASCII strings using Punycode transcription.

The Standard for IDN---IDNA
In order to fulfill the requirements of end users who want to read and write with their own languages, which maybe non-ASCII characters, Internationalizing Domain Names in Applications (IDNA) was selected as the standard. Although the research for IDN has been started since early 1990, the initial versions for IDNA standard were published at the year 2003 and after several years implantation and examination, IDNA standard has been updated at the year 2008.
Internationalizing Domain Names in Applications as a standard was used to handle IDNs. From the document RFC 3490, we could get that IDNA works by allowing applications to indicate Unicode name labels through the existing ASCII name labels. Since IDNA does not need to change any infrastructure, there will be no impacts to the lower-layer, and lower-layer protocols do not need do any change to accommodate to this standard.

Similar Documents

Premium Essay

It245 Intro to Network Management

...IT245 IP5 Introduction to Network Management Individual Project Carol McClellan February 10, 2014 Contents Identifying the Network 4 The Company Considered 4 The Networks Considered 4 Servers Applied 4 Roles of Network managers 4 Diagramming the Network 5 Legend for the Diagram 5 Diagram 6 Network Models 7 The Seven Layers of the OSI Model 7 Physical Layer 7 Data Link Layer 7 Network Layer 7 Transport Layer 7 Session Layer 8 Presentation Layer 8 Application Layer 8 FCAPS 9 Fault Management 9 Configuration Management 9 Accounting 10 Performance 10 Security 10 Protocols and Agents 12 Transport Layer 12 Application Layer 12 Presentation Layer 13 Session Layer 13 Network Layer 13 Data Link Layer 14 Physical Layer 14 Network Security 15 Network Management2 16 FOOTNOTES 18 Identifying the Network The Company Considered I have decided to use Walmart for my individual project. It is an international company with 11,137 retail units in twenty-seven countries on five continents. It employs over two million people around the world. The Networks Considered There are numerous networks that would be needed for an international company such as this. In addition to the ones used nationally, there would be others in relation to language and monetary differences and shipping differences. There would also be a more extensive requirement as far as tariffs and taxes. Some of the national ones would be taking...

Words: 5551 - Pages: 23

Premium Essay

Paper

...Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Professional Group Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or...

Words: 229697 - Pages: 919

Free Essay

Is535 Implementation Plan

...IMPLEMENTATION PLAN IS 535 - Managerial Applications of Information Technology 4/10/2012 Contents Section I: Purpose of Plan Section II: Strategic Business Plan Rationale Disruptive Forces in USPS Market: Opportunity for Future Relevance: Raison d'être/ Justification for plan: Porter’s Model and EagleMail I. Rivalry among Competing Firms II. Potential Development of Substitutes III. Buyer Power IV. Bargaining Power of suppliers V. Threat Of New Entrants Rationale Summarized Section III: Current Systems Major Systems Supporting Business Functions and Processes List of Current USPS MIS Specific Examples of Innovation by Foreign Postal Services Section IV: New Developments System Projects Identity and access management Account Creation Figure 1: Overview of Account Creation Process Email infrastructure Figure 2: Illustration of Email Process in Company Environment Web portal Business Information Systems Business continuity and disaster recovery Section V: Management Strategy Senior Management: Middle Management: Security Validation: Sales and Marketing: Human Resources: Operational Management: Section VI: Budget Requirements Budgeting the New Implementations Table 1: Illustration of Costs for Implementation of Proof of Concept EagleMail Plan Cost benefits and models to evaluate the cost and assets. Is the project at risk? What are the benefits? References  Section I: Purpose of Plan How important...

Words: 16382 - Pages: 66

Premium Essay

Data Mining Practical Machine Learning Tools and Techniques - Weka

...Data Mining Practical Machine Learning Tools and Techniques The Morgan Kaufmann Series in Data Management Systems Series Editor: Jim Gray, Microsoft Research Data Mining: Practical Machine Learning Tools and Techniques, Second Edition Ian H. Witten and Eibe Frank Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration Earl Cox Data Modeling Essentials, Third Edition Graeme C. Simsion and Graham C. Witt Location-Based Services Jochen Schiller and Agnès Voisard Database Modeling with Microsoft® Visio for Enterprise Architects Terry Halpin, Ken Evans, Patrick Hallock, and Bill Maclean Designing Data-Intensive Web Applications Stefano Ceri, Piero Fraternali, Aldo Bongio, Marco Brambilla, Sara Comai, and Maristella Matera Mining the Web: Discovering Knowledge from Hypertext Data Soumen Chakrabarti Understanding SQL and Java Together: A Guide to SQLJ, JDBC, and Related Technologies Jim Melton and Andrew Eisenberg Database: Principles, Programming, and Performance, Second Edition Patrick O’Neil and Elizabeth O’Neil The Object Data Standard: ODMG 3.0 Edited by R. G. G. Cattell, Douglas K. Barry, Mark Berler, Jeff Eastman, David Jordan, Craig Russell, Olaf Schadow, Torsten Stanienda, and Fernando Velez Data on the Web: From Relations to Semistructured Data and XML Serge Abiteboul, Peter Buneman, and Dan Suciu Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations Ian H. Witten and Eibe Frank ...

Words: 191947 - Pages: 768

Premium Essay

Dataminig

...Third Edition This page intentionally left blank Data Mining Practical Machine Learning Tools and Techniques Third Edition Ian H. Witten Eibe Frank Mark A. Hall AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Morgan Kaufmann Publishers is an imprint of Elsevier Morgan Kaufmann Publishers is an imprint of Elsevier 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA This book is printed on acid-free paper. Copyright © 2011 Elsevier Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers must always rely on their...

Words: 194698 - Pages: 779

Premium Essay

Business Law.Types of Companies

...Definition: An information system can be any organized combination of people, hardware, software, computer networks and data resources that stores and retrieves, transforms, and disseminates information in an organization. Roles of IS in Business: There are three fundamental reasons for all business applications of information technology. They are found in the three vital roles that information system can perform for a business enterprise.  Support of its business processes and operations.  Support of decision making by its employees and managers.  Support of its strategies for competitive advantage. Trends in IS: The business applications of information systems have expanded significantly over the years.  Data Processing (1950s – 1960s): Electronic data processing systems which includes transaction processing, record keeping, and traditional accounting applications.  Management Reporting (1960s – 1970s): Management information systems that include preparation of management reports of pre specified information to support decision making.  Decision Support (1970s – 1980s): Decision support systems include interactive ad hoc support of managerial decision making process.  Strategic and End User Support (1980s – 1990s): o End user computing systems: Direct computing support for end user productivity and work group collaboration. o Executive information systems: Critical information for top management. o Expert Systems: Knowledge based expert advice for...

Words: 13881 - Pages: 56

Premium Essay

Windows 10 Introduction

...Introducing Windows 10 for IT Professionals Technical Overview ED BOTT PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright 2016 © Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-0-7356-9697-6 Printed and bound in the United States of America. First Printing Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Support at mspinput@microsoft.com. Please tell us what you think of this book at http://aka.ms/tellpress. This book is provided “as-is” and expresses the author’s views and opinions. The views, opinions and information expressed in this book, including URL and other Internet website references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty/ Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. Acquisitions Editor: Rosemary Caperton Project Editor: Christian Holdener; S4Carlisle Publishing Services Editorial Production:...

Words: 48336 - Pages: 194

Free Essay

Hello Babys

...Business   P lan   P roposal   –   F ebruary   6 th,   2 015     Group  5   Achard,  David;  Chams,  Karim;  Fiaux,  Remy    Kocarslan,  Yasemin;  Polano,  Nils   Schaufelberger,  Tatjana;  Tayza,  Htet     1     Table  of  Contents   EXECUTIVE  SUMMARY  .........................................................................................................................................................  4   INDUSTRY  ANALYSIS  .............................................................................................................................................................  6   INDUSTRY  SIZE,  GROWTH  RATE  AND  PROJECTIONS  ...................................................................................................................................  6   INDUSTRY  STRUCTURE  &  NATURE  OF  PARTICIPANTS  ................................................................................................................................  6   INDUSTRY  TRENDS  &  KEY  SUCCESS  FACTORS  .............................................................................................................................................  6   LONG-­‐TERM  PROSPECTS  ..............................................................................................

Words: 13886 - Pages: 56

Premium Essay

Impotent Music

...INFORMATION RESOURCE GUIDE Computer, Internet and Network Systems Security An Introduction to Security i Security Manual Compiled By: S.K.PARMAR, Cst N.Cowichan Duncan RCMP Det 6060 Canada Ave., Duncan, BC 250-748-5522 sunny@seaside.net This publication is for informational purposes only. In no way should this publication by interpreted as offering legal or accounting advice. If legal or other professional advice is needed it is encouraged that you seek it from the appropriate source. All product & company names mentioned in this manual are the [registered] trademarks of their respective owners. The mention of a product or company does not in itself constitute an endorsement. The articles, documents, publications, presentations, and white papers referenced and used to compile this manual are copyright protected by the original authors. Please give credit where it is due and obtain permission to use these. All material contained has been used with permission from the original author(s) or representing agent/organization. ii T eofContent abl 1.0 INTRODUCTION........................................................................................................................................................... 2 1.1 BASIC INTERNET TECHNICAL DETAILS ........................................................................................................................ 2 1.1.1 TCP/IP : Transmission Control Protocol/Internet Protocol .........................................

Words: 134858 - Pages: 540

Premium Essay

Student

...Do The Deep Information Computer Technology Author Musisi Boney 2013 EDITION Authored by Musisi Boney; +256788489095 2 Table of contents Topics Page Introduction To Computer …………………………………………………….. 5 History & Evolution Of Computers ………………………………………….... 7 Computer Generation …………………………………………………………. 11 Computers Today ……………………………………………………………... 15 Computer Classification ………………………………………………………. 19 Computer System ……………………………………………………………... 25 Computer Hardware ………………………………………………………….. 27 - Input devices/hardware .………………………………………………..27 - Output devices/ hardware..…………………………………….…….....39 - Storage hardware /devices ……………………………………………..49 - Processing devices/hardware …………………………………………..63 - Communication devices/hardware…………………………………….. Computer Software …………………………………………….……………...69 - Utility program …………………………………………………………70 - Operating system ……………………………………………….………72 - Programming languages ………………………………………………78 - Terminologies Used in Software ………………..……………….…....80 Powering A Computer ……………………………………………….………..83 Uninterrupted Power Supply……………………………………………….....85 Computer Configuration…………...…………………………….……………87 Computer Viruses ……………………………………………….……………89 Communication ………………………………………………………………95 Internet ………………………………………………………………………113 Web Design …………………………………………………………………121 Computer Ethics …………………………………………………….………125 Computer Crimes …………………………………………………….……..129 Authored by Musisi Boney; +256788489095 3 Authored by Musisi Boney; +256788489095 4 A COMPUTER ...

Words: 30445 - Pages: 122

Premium Essay

Netwrk Security

...reprinted by permission from Microsoft Corporation. Netscape Communicator browser window © 1999 Netscape Communications Corporation. Used with permission. Netscape Communications has not authorized, sponsored, endorsed, or approved this publication and is not responsible for its content. Permission to reproduce screen shots from the PGP and Sniffer products has been provided by Network Associates, Inc. Network Associates, PGP, Pretty Good Privacy Sniffer, and Distributed Sniffer System are registered trademarks of Network Associates, Inc. and/or its affiliates in the U.S. and/or other countries. MIT screen shots used with permission. Qualcomm's Eudora screen shots used with permission. Copyright © 2001 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be...

Words: 95027 - Pages: 381

Premium Essay

Cool

...ACCESS CONTROL IN SUPPORT OF INFORMATION SYSTEMS SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 2, Release 2 26 DECEMBER 2008 Developed by DISA for the DoD UNCLASSIFIED Access Control in Support of Information Systems STIG, V2R2 26 December 2008 DISA Field Security Operations Developed by DISA for the DoD This page is intentionally blank. ii UNCLASSIFIED Access Control in Support of Information Systems STIG, V2R2 26 December 2008 DISA Field Security Operations Developed by DISA for the DoD TABLE OF CONTENTS Page SUMMARY OF CHANGES...................................................................................................... IX 1. INTRODUCTION................................................................................................................. 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 2. Background ..................................................................................................................... 1 Authority ......................................................................................................................... 2 Scope............................................................................................................................... 3 Writing Conventions....................................................................................................... 3 Vulnerability Severity Code Definitions ........................................................................ 4 STIG Distribution .......

Words: 38488 - Pages: 154

Free Essay

Test

...4. To communicate with the Internet using a dial-up modem, a user’s computer must connect to another computer that is already communicating with the Internet. ANS: T PTS: 1 5. It is not possible to connect two local area networks so that they can share peripherals as well as software. ANS: F PTS: 1 6. Metropolitan area networks can transfer data at fast, LAN speeds but over smaller geographic regions than typically associated with a local area network. ANS: F 7. ANS: T 8. networks. ANS: T 9. ANS: F PTS: 1 The Internet is not a single network but a collection of thousands of networks. PTS: 1 One of the most explosive areas of growth in recent years has been cellular phone PTS: 1 By the 1970s, telephone systems carried more computer data than voice. PTS: 1 10. Network architectures are cohesive layers of protocols defining a set of communication services. ANS: T PTS: 1 11. The OSI model tells us what kind of wire or what kind of connector to use to connect the pieces of a network. ANS: F 12. ANS: F points. 13. ANS: T 14. ANS: F 15. software. ANS: T 16. ANS: T 17. ANS: T 18. ANS: F 19. ANS: T PTS: 1 The application layer of the OSI model is responsible for token management. PTS: 1 The session layer of the OSI model is responsible for establishing synchronization PTS: 1 The network layer of the OSI model is an end-to-end layer. PTS: 1 The...

Words: 46505 - Pages: 187

Premium Essay

Information Technology

...rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 70 CHAPTER 3 1. Describe the major ethical issues related to information technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security...

Words: 25389 - Pages: 102

Premium Essay

Mr Mazu

...Rashesh Shah did it. Sanjeev Bikhchandani did it. Shantanu Prakash did it. 'Stay Hungry, Stay Foolish' is the story of 25 such IIM Ahmedabad graduates who chose the rough road of entrepreneurship. They are diverse in age, in outlook and the industries they made a mark in. But they have one thing in common: they believed in the power of their dreams. This book seeks to inspire young graduates to look beyond placements and salaries. To believe in their dreams. The Centre for Innovation, Incubation and Entrepreneurship (CIIE) at IIM Ahmedabad aims at fostering innovation-driven entrepreneurship through incubation, research and dissemination of knowledge. Rs.125/- - Rashmi Bansal ISBN 978-81-904530-1-1 CONTENTS - THE BELIEVERS - THE OPPORTUNISTS - THE ALTERNATE VISION THE BELIEVERS People who knew entrepreneurship was the Chosen Path. They took the plunge straight after their MBA or after working barely a couple of years. And they persevered until they made it big! p02 THE BOOK OF JOB Sanjeev Bikhchandani (PGP 1989), naukri.com Sanjeev is India's most successful internet entrepreneur. For close to a decade he struggled on the sidelines but never gave up on his Big Idea. In 2006, naukri.com became the first dotcom to IPO on an Indian stock exchange. p18 ROCK WITH IT, ROLL WITH IT Shantanu Prakash (PGP 1988), Educomp Despite a regular middle class upbringing, Shantanu went into business while doing his BCom. The entrepreneurial streak continued after...

Words: 114565 - Pages: 459