Skip to main content

By the way, do you know why chat programs use UDP?




The normal standard in data transmission on the internet is TCP/IP (Transmission Control Protocol/IP). The system uses data transmission where the receiving system sends the message to the transmitting system that it has received the data. The problem is that the transmitting system can mirror the receiving system by benefiting the receiving system's feedback when data is traveling on the Internet. 

On the Internet, the term carrier IQ means code. (That code is sometimes called control or aiming code). There are many names for that code that involves data of the receiving system. In TCP/IP, there is the control code at both ends of the data flow. So the system can send the information of received data to the sender. 

That tells routers and switches where they should route the data flow. On the internet, every single device must have an IP address. That is the "telephone number" of that system. The Carrier IQ is the code that is telling the router. Where it aims the data flow. There is information about the receiving system. 

Every each data package is equipped with a carrier IQ. The Carrier IQ is telling the gate and router where it should send the data package. After the carrier IQ is the code that encodes data. And that thing makes it impossible to open the data package that is accidentally routed to the wrong receiving computer. There is the possibility that the IP address of the network card of the receiving system will get a new IP address while the system transmits long data flow like a movie. 

But the thing is that if the system uses UDP the receiving system would not send an answer that it receives the data. That means that tracking the receiving system is more difficult than using TCP/IP. If there is no answer from the receiving system. The tracker must use different methods like "ping" commands for tracking the place. 

Where the receiving system locates. The tracking of receiving system is not impossible. But it cannot make straight by using the carrier-IQ. Of course, if the receiving system answers tracking of its location happens by using the carrier IQ. 

For data security, the carrier IQ very complicated thing. The truth is that the internet needs that thing for routing data to a certain system. In TCP/IP protocol the system uses the GSM repeaters to locate the mobile systems. The system follows the data flow. And when a certain system answers for the certain carrier IQ. The repeating stations will react to that message they will track that system. 

In fixed systems that operation is easier. The tracking tool requires knowing where the internet socket is and then the security team can close that socket or send the officials. Of course, there is the possibility that somebody hides an unauthorized WLAN support station in some network. So any network is completed secured. 

Comments

Popular posts from this blog

Schrödinger's cat: and the limits of that idea.

"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger's cat). But the same thing can use as model for many other thought experiments.  Sooner or later, or at least in the ultimate end of the universe, the Schrödinger's cat will turn into wave movement. The information that this cat involved exists but the cat does not exist in its material form. The information doesn't ever vanish. It just turns its shape.  We are all trapped in the universe and time. The universe is the space that is entirety to us. There are no confirmed other universities. But the multiverse is a logical continuum for the expanding galactic megastructures.  The problem with natural things is this. They are black and white. They exist or do not exist. Could there be something, that exists and not exists at the same time?  Scrödinger's cat is thinking experiment about case their cat is not dead or not alive. But in this...

The string theory offers a new way to calculate Pi.

"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Euler-Beta Functions and Feynman Diagrams, they modeled particle interactions efficiently. Credit: SciTechDaily.com" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Leap in Mathematics) People normally think that. The pi is the ratio of the circumference circle's circumference to the circle's diameter. The Pi is a mathematical constant 3.14159..., the endless decimal number. The Pi is interesting because developers can use that decimal number to make the encryption algorithms stronger.  The idea is that the encryptions program hides the message's original ASCII numbers by multiplicating those numbers with some decimal number. Or the system can add some numbers to those ASCII numbers.  "Aninda Sinha (left) and Arnab Saha (right). Credit: Manu Y" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Le...

There are always more than three actors in the real world.

"An international research team is advancing precision timekeeping by developing a nuclear clock using thorium isotopes and innovative laser methods, potentially transforming our understanding of physical constants and dark matter. (Artist’s concept.) Credit: SciTechDaily.com" (ScitechDaily, Unveiling the Thorium Nuclear Clock and Its Time-Twisting Secrets) From Three-body problem... There are no pure three-body systems in nature. There are always more than three components in the system. For making real three-body systems we must separate those three bodies from the environment. Otherwise, there are stable effects. But nobody can predict some effects like distant supernova explosions or sun eruptions.  And one of those things that affect all bodies is time. When radioactive materials decay. That affects the stability and symmetry of the object.  Energy levels affect the existence of things like neutrons. The thorium atom clocks are next-generation tools for time measurement....