Translation components API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/translations/cnp3-ebook/principlestransport/en/changes/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "count": 28,
    "next": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/changes/?format=api&page=2",
    "previous": null,
    "results": [
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37732/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509064+02:00",
            "action": 59,
            "target": "There are two important models used to organize a networked application. The first and oldest model is the client-server model. In this model, a server provides services to clients that exchange information with it. This model is highly asymmetrical: clients send requests and servers perform actions and return responses. It is illustrated in the figure below.",
            "id": 14989,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/14989/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37733/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509127+02:00",
            "action": 59,
            "target": "The client-server model was the first model to be used to develop networked applications. This model comes naturally from the mainframes and minicomputers that were the only networked computers used until the 1980s. A minicomputer_ is a multi-user system that is used by tens or more users at the same time. Each user interacts with the minicomputer by using a terminal. Such a terminal was mainly a screen, a keyboard and a cable directly connected to the minicomputer.",
            "id": 14990,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/14990/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37734/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509172+02:00",
            "action": 59,
            "target": "There are various types of servers as well as various types of clients. A web server provides information in response to the query sent by its clients. A print server prints documents sent as queries by the client. An email server forwards towards their recipient the email messages sent as queries while a music server delivers the music requested by the client. From the viewpoint of the application developer, the client and the server applications directly exchange messages (the horizontal arrows labeled `Queries` and `Responses` in the above figure), but in practice these messages are exchanged thanks to the underlying layers (the vertical arrows in the above figure). In this chapter, we focus on these horizontal exchanges of messages.",
            "id": 14991,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/14991/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37735/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509212+02:00",
            "action": 59,
            "target": "Human conversations can be very formal, e.g. when soldiers communicate with their hierarchy, or informal such as when friends discuss. Computers that communicate are more akin to soldiers and require well-defined rules to ensure a successful exchange of information.  There are two types of rules that define how information can be exchanged between computers :",
            "id": 14992,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/14992/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37736/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509249+02:00",
            "action": 59,
            "target": "Syntactical rules that precisely define the format of the messages that are exchanged. As computers only process bits, the syntactical rules specify how information is encoded as bit strings.",
            "id": 14993,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/14993/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37737/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509283+02:00",
            "action": 59,
            "target": "Organization of the information flow. For many applications, the flow of information must be structured and there are precedence relationships between the different types of information. In the time example above, Alice must greet Bob before asking for the current time. Alice would not ask for the current time first and greet Bob afterwards. Such precedence relationships exist in networked applications as well. For example, a server must receive a username and a valid password before accepting more complex commands from its clients.",
            "id": 14994,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/14994/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37738/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509320+02:00",
            "action": 59,
            "target": "A network is always designed and built to enable applications running on hosts to exchange information. In a previous chapter, we have explained the principles of the `network layer` that enables hosts connected to different types of datalink layers to exchange information through routers. These routers act as relays in the network layer and ensure the delivery of packets between any pair of hosts attached to the network.",
            "id": 14995,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/14995/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37739/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509355+02:00",
            "action": 59,
            "target": "These imperfections of the `connectionless network layer service` are caused by the operations of the `network layer`. This `layer` is able to deliver packets to their intended destination, but it cannot guarantee their delivery. The main cause of packet losses and errors are the buffers used on the network nodes. If the buffers of one of these nodes becomes full, all arriving packets must be discarded. This situation frequently happens in practice [#fqueuesize]_. Transmission errors can also affect packet transmissions on links where reliable transmission techniques are not enabled or because of errors in the buffers of the network nodes.",
            "id": 14996,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/14996/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37740/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509392+02:00",
            "action": 59,
            "target": "An invocation of the `connection-oriented service` is divided into three phases. The first phase is the establishment of a `connection`. A `connection` is a temporary association between two users through a service provider. Several connections may exist at the same time between any pair of users. Once established, the connection is used to transfer SDUs. `Connections` usually provide one bidirectional stream supporting the exchange of SDUs between the two users that are associated through the `connection`. This stream is used to transfer data during the second phase of the connection called the `data transfer` phase. The third phase is the termination of the connection. Once the users have finished exchanging SDUs, they request the service provider to terminate the connection. As we will see later, there are also some cases where the service provider may need to terminate a connection itself.",
            "id": 14997,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/14997/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37741/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509429+02:00",
            "action": 59,
            "target": "The third phase of a connection is its release. As a connection involves three parties (two users and one service provider), any of them can request the termination of the connection. Usually, connections are terminated upon request of one user once the data transfer is finished. However, sometimes the service provider may be forced to terminate a connection. This can be due to lack of resources inside the service provider or because one of the users is not reachable anymore through the network. In this case, the service provider will issue `Disconnect.indication` primitives to both users. These primitives will contain, as parameter, some information about the reason for the termination of the connection. Unfortunately, as illustrated in the figure below, when a service provider is forced to terminate a connection it cannot guarantee that all SDUs sent by each user have been delivered to the other user. This connection release is said to be abrupt as it can cause losses of data.",
            "id": 14998,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/14998/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37742/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509487+02:00",
            "action": 59,
            "target": "An important point to note about the connection-oriented service is its reliability. A `connection-oriented` service can only guarantee the correct delivery of all SDUs provided that the connection has been released gracefully. This implies that while the connection is active, there is no guarantee for the actual delivery of the SDUs exchanged as the connection may need to be abruptly released at any time.",
            "id": 14999,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/14999/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37743/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509529+02:00",
            "action": 59,
            "target": "The transport layer entity interacts with both a user in the application layer and the network layer. It improves the network layer service to make it usable by applications. From the application's viewpoint, the main limitations of the network layer service come from its unreliable service:",
            "id": 15000,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/15000/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37744/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509565+02:00",
            "action": 59,
            "target": "the network layer may corrupt data;",
            "id": 15001,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/15001/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37745/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509599+02:00",
            "action": 59,
            "target": "the network layer may loose data;",
            "id": 15002,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/15002/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37746/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509634+02:00",
            "action": 59,
            "target": "the network layer may not deliver data in-order;",
            "id": 15003,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/15003/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37747/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509669+02:00",
            "action": 59,
            "target": "the network layer has an upper bound on maximum length of the data;",
            "id": 15004,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/15004/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37748/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509704+02:00",
            "action": 59,
            "target": "the network layer may duplicate data.",
            "id": 15005,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/15005/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37749/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509738+02:00",
            "action": 59,
            "target": "an `error detection` mechanism that allows detecting corrupted data",
            "id": 15006,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/15006/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37750/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509784+02:00",
            "action": 59,
            "target": "Compared to the connectionless network layer service, the transport layer service allows several applications running on a host to exchange SDUs with several other applications running on remote hosts. Let us consider two hosts, e.g. a client and a server. The network layer service allows the client to send information to the server, but if an application running on the client wants to contact a particular application running on the server, then an additional addressing mechanism is required. The network layer address identifies a host, but it is not sufficient to differentiate the applications running on a host. `Port numbers` provides this additional addressing. When a server application is launched on a host, it registers a `port number`. This `port number` will be used by the clients to contact the server process.",
            "id": 15007,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/15007/?format=api"
        },
        {
            "unit": "https://weblate.info.ucl.ac.be/api/units/37751/?format=api",
            "component": "https://weblate.info.ucl.ac.be/api/components/cnp3-ebook/principlestransport/?format=api",
            "translation": "https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlestransport/en/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2022-09-17T01:14:38.509835+02:00",
            "action": 59,
            "target": "Like the connectionless service, the connection-oriented service allows several applications running on a given host to exchange data with other hosts. The port numbers described above for the connectionless service are also used by the connection-oriented service to multiplex several applications. Similarly, connection-oriented protocols use checksums/CRCs to detect transmission errors and discard segments containing an invalid checksum/CRC.",
            "id": 15008,
            "action_name": "String updated in the repository",
            "url": "https://weblate.info.ucl.ac.be/api/changes/15008/?format=api"
        }
    ]
}