myspace profile view counter
| About BytePile.com | Contact | News@BytePile.com |

Sun 22-October-2017



 Mass Storage Services:
  RAID Arrays - Storage
  SAN & NAS Storage - Services
  Tape Systems - Services



 Hosting & Web Services:
  Shared Hosting
  Dedicated Hosting
  Collocation Services



 Networks & Technology:
  BytePile Network Maps
  System Hardware
  Software Suites



 Company:
  About BytePile.com
  News@BytePile.com



 Support:
  Definitions & Terms
  Frequently Asked Questions



 Tech - White Papers:
  CAT-6 Tutorial by Lucent (pdf)
  Data Speed Table
  Dbase Conf. SAN or NAS (pdf)
  DSL Types & Categories
  Ethernet (UTP) CAT Cables
  Fibre Channel Overview
  RAID 3 vs. RAID 5 in HPC
  RAID Types & Categories
  T1 & T3 RJ-48 Cables
  The SAN Book 3.0 (7MB pdf)


 Legal:
  Acceptable Use Policy
  Privacy Statement
  Service License Agreement



CaseLabs, The Next Generation of Enthusiast Cases

True Crypt - Free Open Source On - The Fly Encryption

Phisical Psience ΦΨ

StatCounter






Definitions & Terms


Logo Dumbbell Nebula

1-10  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z




T-1/2/3/3D:

  • See T-carrrier system

T-carrier system:

  • The T-carrier system, introduced by the Bell System in the U.S. in the 1960s, was the first successful system that supported digitized voice transmission. The original transmission rate (1.544 Mbps) in the T-1 line is in common use today in Internet service provider (ISP ) connections to the Internet. Another level, the T-3 line, providing 44.736 Mbps, is also commonly used by Internet service providers. Another commonly installed service is a fractional T-1, which is the rental of some portion of the 24 channels in a T-1 line, with the other channels going unused.
  • The T-carrier system is entirely digital, using pulse code modulation and Time-Division Multiplexing. The system uses four wires and provides duplex capability (two wires for receiving and two for sending at the same time). The T-1 digital stream consists of 24 64-Kbps channels that are multiplexed. (The standardized 64 Kbps channel is based on the bandwidth required for a voice conversation.) The four wires were originally a pair of twisted pair copper wires, but can now also include coaxial cable, optical fiber, digital microwave, and other media. A number of variations on the number and use of channels are possible.
  • In the T-1 system, voice signals are sampled 8,000 times a second and each sample is digitized into an 8-bit word. With 24 channels being digitized at the same time, a 192-bit frame (24 channels each with an 8-bit word) is thus being transmitted 8,000 times a second. Each frame is separated from the next by a single bit, making a 193-bit block. The 192 bit frame multiplied by 8,000 and the additional 8,000 framing bits make up the T-1's 1.544 Mbps data rate. The signaling bits are the least significant bits in each frame.

TCP:

TCP-IP:

Telecommunication Standardization Sector of the International Telecommunications Union - ITU-T:

  • Telecommunication Standardization Sector of the International Telecommunications Union (ITU-T) is the primary international body for fostering cooperative standards for telecommunications equipment and systems. It was formerly known as the CCITT. It is located in Geneva, Switzerland.

Telnet:

Telephone Jacks RJ-11/14/45:

  • In the U. S., telephone jacks are also known as registered jacks, sometimes described as RJ-XX, and are a series of telephone connection interfaces (receptacle and plug) that are registered with the U.S. Federal Communications Commission (FCC). They derive from interfaces that were part of AT&T's Universal Service Order Codes (USOC) and were adopted as part of FCC regulations (specifically Part 68, Subpart F. Section 68.502). The term jack sometimes means both receptacle and plug and sometimes just the receptacle.
  • RJ-11
  • The most common telephone jack is the RJ-11 jack, which can have six conductors but usually is implemented with four. The RJ-11 jack is likely to be the jack that your household or office phones are plugged into from the ordinary "untwisted" wire (sometimes called "gray satin" or "flat wire") people are most familiar with. In turn, the jacks connect to the "outside" longer wires known as twisted pair that connect to the telephone company central office or to a private branch exchange (PBX).
  • The four wires are usually characterized as a red and green pair and a black and white pair. The red and green pair typically carry voice or data. On an outside phone company connection, the black and white pair may be used for low-voltage signals such as phone lights. On a PBX system, they may be used for other kinds of signaling. Your computer modem is usually connected to an RJ-11 jack.
  • RJ-14
  • The RJ-14 is similar to the RJ-11, but the four wires are used for two phone lines. Typically, one set of wires (for one line) contains a red wire and a green wire. The other set contains a yellow and black wire. Each set carries one analog "conversation" (voice or data).
  • RJ-45
  • The RJ-45 is a single-line jack for digital transmission over ordinary phone wire, either untwisted or twisted. The interface has eight pins or positions. For connecting a modem, printer, or a data PBX at a data rate up to 19.2 Kbps, you can use untwisted wire. For faster transmissions in which you're connecting to an Ethernet 10BASET network, you need to use twisted pair wire. (Untwisted is usually a flat wire like common household phone extension wire. Twisted is often round.) There are two varieties of RJ-45: keyed and unkeyed. Keyed has a small bump on its end and the female complements it. Both jack and plug must match.

Terabyte:

Third-Party Mail Relay:

  • A third-party mail relay, also called an open relay mail message, is an e-mail message sent through a mail server where neither the sender nor the recipient is a local user. In the past, third-party mail relays were useful for allowing network administrators to debug mail connectivity issues and route mail around known problems. Spammers, however, have learned that by hijacking these open relays, they can in effect "launder" their spam by successfully delivering their unsolicited e-mail while spoofing their own identity.
  • Spammers are able to locate accessible third-party mail relay servers by using automated tools that are readily available on the Internet. By relaying mail through several open relay mail servers at the same time, it is possible to flood the Internet with large amounts of junk mail in a very short period of time before being detected. Spammers who use third-party mail relays not only damage the reputation of those whose servers they have hijacked, clog networks with junk mail, and frequently crash servers -- they are guilty of breaking the law because technically, they are stealing services. Also see Open Relay

Tunelling:

  • See Port Forwarding





Google  


MySQL Database Powered Powered by Apache Full with PHP Modules Powered by Perl linux-logo
Last Update - 10 April 2012 All Rights Reserved. Copyright © 2002 BytePile.com Inc.