- Industry: Telecommunications
- Number of terms: 29235
- Number of blossaries: 0
- Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
The current that flows through a photosensitive device, such as a photodiode, as the result of exposure to radiant power. Note 1: The photocurrent may occur as a result of the photoelectric, photoemissive, or photovoltaic effect. Note 2: The photocurrent may be enhanced by internal gain caused by interaction among ions and photons under the influence of applied fields, such as occurs in an avalanche photodiode (APD. )
Industry:Telecommunications
The controlled deletion of stuffing bits from a stuffed digital signal, to recover the original signal. Synonyms negative justification, negative pulse stuffing.
Industry:Telecommunications
The cryptographic transformation of data (see cryptography) to produce ciphertext. Note Encipherment may be irreversible, in which case the corresponding decipherment process cannot feasibly be performed.
Industry:Telecommunications
The creation of IP packets with counterfeit (spoofed) IP source addresses. 2. A method of attack used by network intruders to defeat network security measures such as authentication based on IP addresses. Note 1: An attack using IP spoofing may lead to unauthorized user access, and possibly root access, on the targeted system. Note 2: A packet-filtering-router firewall may not provide adequate protection against IP spoofing attacks. It is possible to route packets through this type of firewall if the router is not configured to filter incoming packets having source addresses on the local domain. Note 3: IP spoofing is possible even if no reply packets can reach the attacker. Note 4: A method for preventing IP spoofing problems is to install a filtering router that does not allow incoming packets to have a source address different from the local domain. In addition, outgoing packets should not be allowed to contain a source address different from the local domain, in order to prevent an IP spoofing attack from originating from the local network.
Industry:Telecommunications
The creation of birefringence in a liquid that is not otherwise birefringent, by subjecting the liquid to an electric field. Note 1: The degree of birefringence, which is manifested as a difference in refractive indices for light of orthogonal linear polarizations, one of which is parallel to the induced optical axis, is directly proportional to the square of the applied electric field strength. Note 2: In the general case, the birefringence produced by the applied electric field can be used in conjunction with polarizers to modulate light. Devices that use this principle are called Kerr cells.
Industry:Telecommunications
The creation of an image from an image concept. Note: The image can be created with computer-graphics software or photography, for example.
Industry:Telecommunications
The court-ordered separation of the Bell Operating Telephone Companies from AT&T.
Industry:Telecommunications
The course of developmental changes through which a system passes from its conception to the termination of its use and subsequent salvage. Note: For example, a system life cycle might include the phases and activities associated with the analysis, acquisition, design, development, test, integration, operation, maintenance, and modification of the system.
Industry:Telecommunications
The coupling of a signal from one channel, circuit, or conductor to another, where it is usually considered to be an undesired signal.
Industry:Telecommunications
The coupling of a lightwave from one dielectric waveguide into another dielectric waveguide upon the application of an electric field or electrical signal. Note: Devices that perform ECC can be used as switches.
Industry:Telecommunications