All > Technology > Telecommunications
Abbreviation for numerical aperture.
- Browse Related Terms: AC, AMI, app, ATM, B, b/s, basecom, BCI, Bd, BOC, BW, C.O., CAD, CATV, CCS, COG, EO, EOW, ESD, ESF, FC, FEP, FIFO, FILO, FO, MFD, MFJ, MHz, MTA, mw, NA, nmi, Np, NPA, NVIS, OD, OPX, OTAR, PLA, PLS, POT, PPP, RAD, RI, RJ, RO, RQ, RSL, RX, s, sr, STP, SX, THD, TLM, TLP, TRANSEC, TX, uv, VNL, XO, XT
All > Technology > Telecommunications
Deprecated term. See dedicated circuit, permanent virtual circuit.
- Browse Related Terms: ATM (asynchronous transfer mode) transport system, ATM switch (asynchronous transfer mode switch), Cancel To, nailed-up circuit, network section, NORM state, normal/alarm (N/A) state bit, permanent virtual circuit (PVC), refresh packets, Skip, virtual call, virtual circuit (VC), virtual connection, virtual network, virtual path
All > Technology > Telecommunications
Acronym for negative-acknowledge character.
- Browse Related Terms: multipurpose Internet mail extension, NAK, POP, RADINT, REN, Sub, uudecode, Wildcard, wildcard character
All > Technology > Telecommunications
In communications security systems, a security penetration technique that makes use of the negative-acknowledge transmission-control character and capitalizes on a potential weakness in a system that handles asynchronous transmission interruption in such a manner that the system is in an unprotected state against unauthorized access during certain periods. [From Weik '89]
- Browse Related Terms: access control mechanism, command and control warfare (C2W), communications protection, communications security (COMSEC), compartmentalization, compartmentation, Computer Security (COMPUSEC), controlled security operation, emission security, failure access, Firewall, malicious code, NAK attack, Privacy, security filter, security management, system integrity, technical vulnerability, two-person control, two-person integrity (TPI)
All > Technology > Telecommunications
With respect to Internet addressing, an entity responsible for the allocation of names. Note: Such naming is typically hierarchical, so that the authority to allocate domain names is restricted to a particular level within a domain, such as ".com", ".net", or ".gov".
- Browse Related Terms: attribute authority, audit information, authentication authority, Authority, control attribute package, Naming Authority, protection profile family, Proxy, resource authority, security attribute, security sub-domain, subject authority
Also listed in:
- All > Technology > Security
All > Technology > Telecommunications
Consists of the United States, Canada and the Caribbean countries: Anguilla, Antigua, Bahamas, Barbados, Bermuda, British Virgin Islands, Canada, Cayman Islands, Dominica, Dominican Republic, Grenada, Jamaica, Montserrat, St. Kitts & Nevis, St. Lucia, St. Vincent & Grenadines, Turks & Caicos Islands, Trinidad & Tobago, and U.S. Caribbean territories (including American Samoa, Puerto Rico, the U.S. Virgin Islands, Guam and the Commonwealth of the Northern Mariana Islands).
- Browse Related Terms: air portable, area code, consolidated carrier, mobile station international ISDN number, Multi Carrier Toll Free Service, NANP Area, North American Number Plan (NANP), numbering plan area (NPA), service access code (SAC), World Numbering Plan
All > Technology > Telecommunications
NANPA holds overall responsibility for the neutral administration of NANP numbering resources, subject to directives from regulatory authorities in the countries that share the NANP. NANPA's responsibilities include assignment of NANP resources, and, in the U.S. and its territories, coordination of area code relief planning and collection of utilization and forecast data.
- Browse Related Terms: access control, access-denial time, anti-spoof, authenticate, fetch protection, NANPA (North American Numbering Plan Administration), network weaving, password, real-time reaction, Spoofing, trusted identification forwarding
All > Technology > Telecommunications
Traffic consisting of plain or encrypted messages written in a natural language and transmitted in accordance with standard formats and procedures. Note: Examples of narrative traffic include (a) messages that are placed on paper tape and transmitted via a teletypewriter (TTY), and on reception, are converted back to a printed page on another teletypewriter or teleprinter and (b) messages printed on a sheet of paper, transmitted via optical character recognition (OCR) equipment, and on reception, converted back to a printed page on a printer.
- Browse Related Terms: cancel character (CAN), character filter, character integrity, character recognition, control character, control operation, end-of-medium character, end-of-transmission-block character (ETB), narrative traffic, nontransparent mode, null character (NUL), Optical Character Recognition (OCR), spatial application, substitute character (SUB), transmission block, transmission control character
All > Technology > Telecommunications
A modem whose modulated output signal has an essential frequency spectrum that is limited to that which can be wholly contained within, and faithfully transmitted through, a voice channel with a nominal 4-kHz bandwidth. Note: High frequency (HF) modems are limited to operation over a voice channel with a nominal 3-kHz bandwidth.
- Browse Related Terms: modulator-demodulator (modem), narrowband modem, narrowband radio voice frequency (NBRVF), voice-frequency (VF) channel, wideband modem
All > Technology > Telecommunications
In narrowband radio, the nominal 3-kHz bandwidth allocated for single channel radio that provides a transmission path for analog and quasi-analog signals.
- Browse Related Terms: modulator-demodulator (modem), narrowband modem, narrowband radio voice frequency (NBRVF), voice-frequency (VF) channel, wideband modem
All > Technology > Telecommunications
Any analog signal or analog representation of a digital signal whose essential spectral content is limited to that which can be contained within a voice channel of nominal 4-kHz bandwidth. Note: Narrowband radio uses a voice channel with a nominal 3-kHz bandwidth.
- Browse Related Terms: area broadcast shift, band-stop filter, bandpass filter, bandwidth (BW), bandwidth-limited operation, brick wall filter, clipping, Filter, fixed-tolerance-band compaction, narrowband signal, roofing filter, soft limiting, stopband
All > Technology > Telecommunications
The organization established by Section 1(a) of Executive Order No. 12472 to assist the President, the National Security Council, the Director of the Office of Science and Technology Policy, and the Director of the Office of Management and Budget, in the discharge of their national security emergency preparedness telecommunications functions. The NCS consists of both the telecommunications assets of the entities represented on the NCS Committee of Principals and an administrative structure consisting of the Executive Agent, the NCS Committee of Principals, and the Manager. 2. The telecommunications system that results from the technical and operational integration of the separate telecommunications systems of the several executive branch departments and agencies having a significant telecommunications capability. [JP 1-02]
- Browse Related Terms: Accounting, Audit, Audit Trail, Authorized user, communications profile, National Communications System (NCS), packet filter, security alarm, security audit, trusted process
All > Technology > Telecommunications
The joint telecommunications industry/Federal Government operation established by the National Communications System to assist in the initiation, coordination, restoration, and reconstitution of National Security or Emergency Preparedness (NS/EP) telecommunications services or facilities.
- Browse Related Terms: mean time to service restoral (MTSR), National Coordinating Center (NCC) for Telecommunications, network survivability, network survivability model, NS/EP telecommunications, restoration, service outage, Telecommunications Device for the Deaf (TDD)
All > Technology > Telecommunications
A standard that governs the use of electrical wire, cable, and fixtures, and electrical and optical communications cable installed in buildings. Note: The NEC was developed by the NEC Committee of the American National Standards Institute (ANSI), was sponsored by the National Fire Protection Association (NFPA), and is identified by the description ANSI/NFPA 70-xxxX, the last four digits representing the year of the NEC revision.
- Browse Related Terms: AFNOR, American National Standards Institute (ANSI), AT Commands, extensibility, Mediation, National Electric Code® (NEC), Open Systems Interconnection (OSI), Open Systems Interconnection (OSI)--Architecture, pregroup translation, pro forma message
All > Technology > Telecommunications
A proposed, advanced, seamless web of public and private communications networks, interactive services, interoperable hardware and software, computers, databases, and consumer electronics to put vast amounts of information at users' fingertips. Note: NII includes more than just the physical facilities (more than the cameras, scanners, keyboards, telephones, fax machines, computers, switches, compact disks, video and audio tape, cable, wire, satellites, optical fiber transmission lines, microwave nets, switches, televisions, monitors, and printers) used to transmit, store, process, and display voice, data, and images; it encompasses a wide range of interactive functions, user-tailored services, and multimedia databases that are interconnected in a technology-neutral manner that will favor no one industry over any other. Synonym information superhighway.
- Browse Related Terms: accounting management, asymmetric digital subscriber line (ADSL), Broadband, class of service, complementary network service (CNS), enhanced service providers, message handling system (MHS), National Information Infrastructure (NII), teletex, value-added carrier, visual telephone services
All > Technology > Telecommunications
The number identifying a calling user line within an area designated by a country code. [T1.104-1991]
- Browse Related Terms: abbreviated address calling, advanced intelligent network (AIN), automatic calling, automatic route selection (ARS), bell (BEL) character, BIRRDS, Call Gap, call management, call-second, community of interest, maximum calling area, national number, national prefix, NDUB (network-determined user busy), perimeter network, Rate Center, slave station, Soft Dial Tone Numbers, telephone number
All > Technology > Telecommunications
A digit or combination of digits to be dialed by a calling subscriber, making a call to a subscriber in his own country but outside his own numbering area. It provides access to the automatic outgoing trunk equipment. [CCITT E.160] [T1.Rpt30-1994]
- Browse Related Terms: abbreviated address calling, advanced intelligent network (AIN), automatic calling, automatic route selection (ARS), bell (BEL) character, BIRRDS, Call Gap, call management, call-second, community of interest, maximum calling area, national number, national prefix, NDUB (network-determined user busy), perimeter network, Rate Center, slave station, Soft Dial Tone Numbers, telephone number
All > Technology > Telecommunications
Information that has been determined, pursuant to Executive Order 12958 or any predecessor order, to require protection against unauthorized disclosure. [INFOSEC-99]
- Browse Related Terms: active threat, automated information systems security, classification, Compromise, computer abuse, file protection, national security information (NSI), network security, operational data security, operations security, passive threat, penetration, security, security classification, sensitive information, tampering, Threat, unclassified
All > Technology > Telecommunications
Any telecommunications or information system operated by the United States Government, the function, operation, or use of which: (a) involves intelligence activities; (b) involves cryptologic activities related to national security; (c) involves command and control of military forces; (d) involves equipment that is an integral part of a weapon or weapon system; or (e) is critical to the direct fulfillment of military or intelligence missions and does not include a system that is to be used for routine administrative and business applications (including payroll, finance, logistics, and personnel management applications). 40 U.S.C. Section 1452, Information Technology Management Reform Act of 1996. [INFOSEC-99]
- Browse Related Terms: attack, automated security monitoring, boundary, computer security subsystem, configuration management, Contingency Plan, national security system, nonrepudiation, RED, RED/BLACK concept, security fault analysis, security range, separation of duties, system profile, system security engineering, Traffic Analysis, Vulnerability