upload
Alliance for Telecommunications Industry Solutions
업종: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
In data transmission or processing, a sequence of bits used to delimit, i.e. Mark, the beginning and end of a frame. Note 1: An 8-bit sequence is usually used as the flag sequence; for example, the 8-bit flag sequence 01111110. Note 2: Flag sequences are used in bit-oriented protocols, such as Advanced Data Communication Control Procedures (ADCCP,) Synchronous Data Link Control (SDLC,) and High-Level Data Link Control (HDLC. )
Industry:Telecommunications
In data processing systems, the time interval required to locate a particular data element, record, or file in a storage device.
Industry:Telecommunications
In data equipment, the change from letters to other characters, or vice versa. 2. In typewriting or typesetting, the change from lower case letters to upper case letters, or vice versa.
Industry:Telecommunications
In data communications, the ratio of (a) the time to transmit a text automatically at a specified modulation rate to (b) the time actually required to receive the same text at a specified maximum error rate. Note 1: All of the communication facilities are assumed to be in the normal condition of adjustment and operation. Note 2: Telegraph communications may have different temporal efficiency factors for the two directions of transmission. Note 3: The practical conditions of measurement should be specified, especially the duration of the measurement.
Industry:Telecommunications
In data communications, a switching system in which all the operations required to execute the three phases of information-transfer transactions are automatically executed in response to signals from a user end-instrument. Note: In an automatic switching system, the information-transfer transaction is performed without human intervention, except for initiation of the access phase and the disengagement phase by a user. 2. In telephony, a system in which all the operations required to set up, supervise, and release connections required for calls are automatically performed in response to signals from a calling device.
Industry:Telecommunications
In data communications, a sequence of events governed by hardware or software, requiring mutual agreement of the state of the operational modes prior to information exchange. 2. The process used to establish communications parameters between two stations. Note: Handshaking follows the establishment of a circuit between the stations and precedes information transfer. It is used to agree upon such parameters as information transfer rate, alphabet, parity, interrupt procedure, and other protocol features.
Industry:Telecommunications
In data communications, a functional unit used to interconnect two or more networks. Note 1: Routers operate at the network layer (layer 3) of the ISO Open Systems Interconnection--Reference Model. Note 2: The router reads the network layer address of all packets transmitted by a network, and forwards only those addressed to another network.
Industry:Telecommunications
In data communications systems, control of the rate at which data are transmitted from a terminal so that the data can be received by another terminal. Note 1: Transmit flow control may occur between data terminal equipment (DTE) and a switching center, via data circuit-terminating equipment (DCE,) or between two DTEs. The transmission rate may be controlled because of network or DTE requirements. Note 2: Transmit flow control can occur independently in the two directions of data transfer, thus permitting the transfer rates in one direction to be different from the transfer rates in the other direction.
Industry:Telecommunications
In cryptosystems, the deliberate planting of apparent flaws in a data processing system for the purpose of detecting attempted penetrations or for confusing an intruder about which flaws to exploit. 2. The deliberate planting of apparent flaws in an information system (IS) for the purpose of detecting attempted penetrations.
Industry:Telecommunications
In conference calling, the state in which the conference is active but without a controller. This state is possible when two or more conferees exist on an active conference and the controller successfully disconnects himself/herself.
Industry:Telecommunications