upload
Alliance for Telecommunications Industry Solutions
Industry: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. The practice of routing telecommunications traffic beyond its intended destination, and then back to the intended destination, usually for the purpose of taking advantage of tariffs or prices that are lower than those afforded by direct routing. 2. In security, to bring a call that has been routed along a particular path (usually via satellite) to some earlier position in the switching sequence (also using satellites. ) Note: The technique supports CALEA, the Communications Assistance to Law Enforcement Act and LAES, Lawfully Authorized Electronic Surveillance. 3. In commercial telephone networks, referring to a trunk or line between two central offices that may not share the same facilities or geographic location, and which trunk is used to support special services, e. G. , orderwires, off-premises extensions, common exchange number routing, or least-cost routing of customer centrex services. 4. In mission programs requiring contingency networking, referring to a link that provides feedback to the mission control center to verify that the transmission via a primary communications has been successful. Note: In cases where the primary path fails to deliver the transmission, the communications may occur over the backhaul connection or an alternative network connection. 5. In contingency networking, an alternative connection that is routed via a diversified path, e. G. , an alternative frequency, satellite facility, cable, trunk, or time slot.
Industry:Telecommunications
1. kaynak veya zaman kritik işlemleri geciktirme yetkili erişimi önleme. 2. herhangi bir eylem veya herhangi bir bölümünü bir bilgi sistemi (IS) çalışmasını engelleyen bir dizi eylem sonucu. 3. 1. Yetkisiz bilgi ve kaynakları stopaj. 4. yasal erişimi önleme. Not: Bu kazayla veya kötü niyetle nedenlerle neden olabilir. 5. yetkili erişim kaynakları veya zaman kritik işlemleri geciktirme önlenmesi. 6. kaynak veya zaman kritik işlemleri geciktirme yetkili erişimi yetkisiz önlenmesi. 7. bir hizmet reddi saldırısı, saldırganın bu amaçlı değil yapıyor, böylece ağ kaynaklarınıza meşru amaçlar için normal kullanımı engelleyen şeyler için bilgisayarınızın kaynaklarını tüketir olduğunda.
Industry:Telecommunications
1. güç donanımı kaldırın ve uygulamak için kullanılan birincil anahtarı. 2. bir devre kesici 1500V dekor ac devrelerde kullanılır.
Industry:Telecommunications
1. The principle requiring that each subject be granted the most restrictive set of privileges needed for the performance of authorized tasks. Application of this principle limits the damage that can result from accident, error, or unauthorized use of an information system (IS. ) 2. The principle of granting only such access rights as are required for subjects to perform their authorized tasks. Note: Extension of the principle of need-to-know covering all access rights, not just "read access". See also: Role. 3. This principle requires that each subject in a system be granted the most restrictive set of privileges (or lowest clearance) needed for the performance of authorized tasks. The application of this principle limits the damage that can result from accident, error, or unauthorized use.
Industry:Telecommunications
1. işlem bilgi sistemi (IS) verileri korur ve işlevini amaçlandığı gibi tutar belirlenemiyor. 2. bir sistem güvenlik özellikleri olarak tasarlanmış uygulanmaktadır ve önerilen uygulama ortamı için yeterli olduklarını belirlemek için kullanılan işlem. Bu süreç el-fonksiyonel test, penetrasyon test ve doğrulama içerir. Ayrıca bkz: fonksiyonel test, penetrasyon test ve doğrulama.
Industry:Telecommunications
1. The profile that includes the service profile and contains all the data associated with the user, e. G. , incoming call handling information, selection of service provider/service area coverage, service subscriptions, service parameters, etc. 2. A description of a user, typically used for access control. Note: A user profile may include data such as user ID, user name, password, access rights, and other attributes. 3. A pattern of a user's activity that can be used to detect changes in the activity. 4. Patterns of a user's activity that can show changes from normal behavior.
Industry:Telecommunications
1. In cryptosystems, a functional unit that can simultaneously process data of two or more security levels without risk of compromising computer security. 2. A device that is used in a manner that permits it to simultaneously process data of two or more security levels without risk of compromise. To accomplish this sensitivity labels are normally stored on the same physical medium and in the same form (i. E. , machine-readable or human-readable) as the data being processed.
Industry:Telecommunications
1. veri iletişimi, ikili basamak, bir dizi aktarılan ve bir bileşik olarak tüm açık veri ve kontrol sinyalleri, dahil olmak üzere. Not: Veri, kontrol sinyalleri ve muhtemelen hata denetimi bilgilerini, belirli bir biçimde düzenlenir. 2. internet iletişimin temel birimi.
Industry:Telecommunications
1. veri iletişimde, sinyalleri, gürültü veya girişim dizisi uygun olarak bazı belirli ölçüt veya ölçü birimi olarak sayılır. 2. sürekli form veya çok parçalı kağıt ayrı levhalar ayırmak için.
Industry:Telecommunications
1. In data transmission, the sequence of contiguous bits delimited by, and including, beginning and ending flag sequences. Note 1: A frame usually consists of a specified number of bits between flag sequences and usually includes an address field, a control field, and a frame check sequence. Note 2: Frames usually consist of a representation of the original data to be transmitted, together with other bits which may be used for error detection or control. Additional bits may be used for routing, synchronization, or overhead information not directly associated with the original data. 2. In the multiplex structure of pulse-code modulation (PCM) systems, a set of consecutive time slots in which the position of each digit can be identified by reference to a frame-alignment signal. Note: The frame-alignment signal does not necessarily occur, in whole or in part, in each frame. 3. In a time-division multiplexing (TDM) system, a repetitive group of signals resulting from a single sampling of all channels, including any required system information, such as additional synchronizing signals. Note: "In-frame" is the condition that exists when there is a channel-to-channel and bit-to-bit correspondence, exclusive of transmission errors, between all inputs of a time-division multiplexer and the output of its associated demultiplexer. 4. In ISDN, a block of variable length, labeled at the Data Link Layer of the Open Systems Interconnection--Reference Model. 5. In video display, the set of all picture elements that represent one complete image. Note: In NTSC and other television standards used throughout the world, a frame consists of two interlaced fields, each of which has half the number of scanning lines, and consequently, half the number of pixels, of one frame. 6. In video display, one complete scanned image from a series of video images. Note: A video frame is usually composed of two interlaced fields. 7. In computer screen displays of HTML documents, a portion (usually rectangular) of the screen where one usually finds the same types of fields/information displayed, in the same manner as one usually finds the same or similar information displayed in the same segment of different copies of a printed form. 8. An HTML feature that allows multiple Web pages to be viewed simultaneously (by means of scrolling or re-sizing) through a browser window.
Industry:Telecommunications