Search Keyword By: V

Description

V number

Synonym normalized frequency.

V reference point

The interface point in an ISDN environment between the line termination and the exchange termination.

V-series Recommendations

Sets of telecommunications protocols and interfaces defined by CCITT (now ITU-T) Recommendations. Note: Some of the more common V.-series Recommendations are:

  • V.21: A CCITT Recommendation for modem communications over standard commercially available lines at 300 b/s. This protocol is generally not used in the United States.
  • V.22bis: A CCITT Recommendation for modem communications over standard commercially available voice-grade channels at 2,400 b/s and below.
  • V.32: A CCITT Recommendation for modem communications over standard commercially available voice-grade channels at 9.6 kb/s and below.
  • V.32bis: A CCITT Recommendation for modem communication over standard commercially available voice-grade channels at 14.4 kb/s and below.
  • V.34: An ITU-T Recommendation for modem communication over standard commercially available voice-grade channels at 28.8 kb/s and below.
  • V.42: A CCITT Recommendation for error correction on modem communications.
  • V.42bis: A CCITT Recommendation for data compression on a modem circuit.
  • V.FAST: A new CCITT Recommendation for high-speed modems currently under development.

vacant code (VC)

A call-disposition category for a call attempt to an unassigned NPA (numbering plan area) or N. [T1.207-1998]

Vacant Code Announcement

This announcement is played when a customer mis-dialed or the NPA-NXX or NXX-X is not valid. An example of such a recording is as follows: “We’re sorry, your call cannot be completed as dialed. Please, check the number and try again.” (See “NIIF Reference Document Part 2 – Installation and Maintenance Responsibilities for SS7 Links and Trunks Attachment H – SS7 Cause Codes and Tones and Announcements,” ATIS-0300019.)

vaccine program

Synonym anti-virus program.

validation

1. Tests to determine whether an implemented system fulfills its requirements. 2. The checking of data for correctness or for compliance with applicable standards, rules, and conventions. 3. [The] process of applying specialized security test and evaluation procedures, tools, and equipment needed to establish acceptance for joint usage of an information system (IS) by one or more departments or agencies and their contractors. [INFOSEC-99] Note: This action will include, as necessary, final development, evaluation, and testing, preparatory to acceptance by senior security test and evaluation staff specialists. [NIS] 4. In universal personal telecommunications, the process of verifying that a user or terminal is authorized to access UPT services.5. The checking of a representation of a system or part of a system for conformance with its requirements [CESG].6.The process of evaluating a ported application, software, or system to ensure compliance with requirements [POSIX.0].

validation system

The system containing the data base information to be used in validation of the telecommunications charge card or billed number screening data. [T1.230-1992]

value date

The date the transfer entry to an account is considered effective; either the day the instruction is received or some future date as stipulated by the originator. [After X9.9]

value-added carrier

A company that sells the services of a value-added network.

Total Count: 156