- Industry: Telecommunications
- Number of terms: 29235
- Number of blossaries: 0
- Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
The execution of the set of functions required for controlling, planning, allocating, deploying, coordinating, and monitoring the resources of a telecommunications network, including performing functions such as initial network planning, frequency allocation, predetermined traffic routing to support load balancing, cryptographic key distribution authorization, configuration management, fault management, security management, performance management, and accounting management. Note: Network management does not include user terminal equipment.
Industry:Telecommunications
The execution of lower priority computer programs when higher priority programs are not using the system resources. Note: Priorities may be assigned by system software, application software, or the operator.
Industry:Telecommunications
The execution of appropriate administrative, technical, or physical means to guard against the unauthorized access to, modification of, or deletion of a file. 2. The aggregate of processes and procedures designed to inhibit unauthorized access, contamination, elimination, modification, or destruction of a file or any of its contents.
Industry:Telecommunications
The excursion of a radio wave from the Earth to the ionosphere and back to the Earth. Note: The number of hops is synonymous with the number of reflections from the ionosphere. 2. A waveform transmitted for the duration of each relocation of the carrier frequency of a frequency-hopped system. 3. To modify a modulated waveform with constant center frequency so that it frequency hops. 4. An intermediate network connection consisting of a leg from one router to another router and over which a packet travels to reach its destination. Note: Hops can be traced using ping or other trace utilities.
Industry:Telecommunications
The exclamation point character (!) used in early addressing schemes to separate the names of individual machines. Note: Bang-style addressing is no longer common. Synonym scream.
Industry:Telecommunications
The event that occurs when a packet crossing a section boundary changes the state of the packet layer interface.
Industry:Telecommunications
The European ITSEC represent the harmonized evaluation criteria for secure products and systems for use within the European Community (EC. )These criteria encompass both functionality and assurance ("correctness" and "effectiveness") aspects of IT security and form the basic standards against which UK evaluations and certifications are carried out within the UK IT Security Evaluation and Certification Scheme.
Industry:Telecommunications
The establishment of the capability for the transmission of user information.
Industry:Telecommunications
The ESE defines the system in security terms, identifying boundaries of security significance. These boundaries may be: a. Internal, i. E. , security partitions within the system, or b. External, i.e. Manual or electronic interfaces to the LSE or the GSE (e. G. Terminals, printers or communications lines to other systems. )
Industry:Telecommunications