upload
Alliance for Telecommunications Industry Solutions
Industry: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
The queries and replies among communications equipment to determine the respective capabilities of each end of the communications link. 2. For layered systems, information exchanged between entities of a given layer, via the service provided by the next lower layer, to coordinate their joint operation.
Industry:Telecommunications
The qualitative level at which a network fulfills its function.
Industry:Telecommunications
The published schedule of rates or charges for a specific unit of equipment, facility, or type of service such as might be provided by a telecommunications common carrier.
Industry:Telecommunications
The protocol reference model defined by layered structures based on and using the terminology of ITU-T Recommendations X. 200 and X. 210. The protocols referred to in this American National Standard conform to the OSI Reference Model for ISDN specified in ITU-T Recommendation I. 320.
Industry:Telecommunications
The protection resulting from features, inherent in some crypto-equipment, that conceal the presence of valid messages on a communications circuit; normally achieved by causing the circuit to appear busy at all times. 2. Measures used to conceal the presence of valid messages in an on-line cryptosystem or secure communications system. Note: Encryption of sending and receiving addresses and causing the circuit to appear busy at all times by sending dummy traffic are two methods of traffic-flow security. A more common method is to send a continuous encrypted signal, whether or not traffic is being transmitted.
Industry:Telecommunications
The protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from intercept and analysis of compromising emanations from other than crypto-equipment and telecommunications systems.
Industry:Telecommunications
The protection of specific fields within a message which is to be transmitted.
Industry:Telecommunications
The protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.
Industry:Telecommunications
The protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional.
Industry:Telecommunications
The protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure.
Industry:Telecommunications