- 産業: Telecommunications
- Number of terms: 29235
- Number of blossaries: 0
- Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
A procedure in which a transmitting station , i.e., a calling station, establishes its own validity without the participation of the receiving station, i.e., the called station. Note: The calling station establishes its own authenticity and the called station is not required to challenge the calling station. Self- authentication is usually used only when one- time authentication systems are used to derive the authentication. 2. Implicit authentication, to a predetermined level, of all transmissions on a secure communications system.
Industry:Telecommunications
A procedure included in the signaling route management (functionality) that is used to inform a signaling point of congestion status of a signaling route.
Industry:Telecommunications
A procedure included in the signaling route management (functionality) that is used to inform a signaling point of the restriction of a signaling route.
Industry:Telecommunications
A procedure included in the signaling route management (functionality) that is used to inform a signaling point of the unavailability of a signaling route.
Industry:Telecommunications
A procedure included in the signaling route management (functionality) that is used to inform a signaling point that a signaling route to a specific destination has become available.
Industry:Telecommunications
A procedure of transferring signaling traffic from one signaling route to another, when the signaling route in use fails or is required to be cleared of traffic.
Industry:Telecommunications
A procedure of transferring, in a controlled way, signaling traffic from an alternative signaling route to the normal signaling route when the latter becomes available.
Industry:Telecommunications
A procedure that appends data to, or performs a cryptographic transformation of, a data unit. The appended data or cryptographic transformation allows reception of the data unit and protects against forgery, e.g., by the recipient.
Industry:Telecommunications
A procedure that is an alternative to the normal path of a process if an unusual but anticipated situation occurs.
Industry:Telecommunications
A procedure that is invoked without being called explicitly whenever an alteration, an addition, or a deletion or other event occurs. Pronounced dee' mun. Also spelled demon.
Industry:Telecommunications