M01 技术管理 标准查询与下载



共找到 133 条与 技术管理 相关的标准,共 9

This Recommendation specifies the technologies involved in countering e-mail spam. It introduces the current technical solutions and related activities from various standards development organizations and relevant organizations for countering e-mail spam. The purpose of this Recommendation is to provide useful information to users who want to develop technical solutions for countering e-mail spam. This Recommendation will be used as a basis for further development of technical Recommendations on countering e-mail spam.

Technologies involved in countering e-mail spam

ICS
CCS
M01
发布
2008-04-01
实施

Recommendation ITU-T Y.2212 provides the service and functional requirements of managed delivery services (MDS).

Requirements of managed delivery services (Study Group 13)

ICS
CCS
M01
发布
2008-02-01
实施

The World Telecommunication Standardization Assembly (Johannesburg, 2008), recognizing that Resolution 122 (Rev. Antalya, 2006) of the Plenipotentiary Conference, on the evolving role of the World Telecommunication Standardization Assembly (WTSA), called also for the organization of the Global Standardization Symposium (GSS); the objective of Resolution 123 (Rev. Antalya, 2006)of the Plenipotentiary Conference, on bridging the standardization gap between developed and developing countries.

Implementation of Resolution 122 (Rev. Antalya, 2006) on the evolving role of the World Telecommunication Standardization Assembly

ICS
CCS
M01
发布
2008
实施

Alongside the wide deployment of home network services and the increasing development of a variety of technologies for telecommunication, contents provision, remote control, etc., concerns over the security of the home network are increasing. As a basic security function for protecting the home network, authorization ensures that only an authorized entity (including user, device) can access the home network resources. Recommendation ITU-T X.1114 describes the security threats and authorization requirements for the home network, identifies the authorization entities and methods, and develops authorization models and authorization modes for guaranteeing the security of the home network.

Authorization framework for home networks (Study Group 17)

ICS
CCS
M01
发布
2008
实施

Recommendation ITU-T Z.450 provides guidelines on the quality aspects of protocol-related ITU-T Recommendations with the objective of: improving the quality of protocol-related Recommendations; and helping to improve the interoperability of products based on these Recommendations.

Quality aspects of protocol-related Recommendations

ICS
CCS
M01
发布
2008
实施

In this Recommendation, the expression "Administration" is used for conciseness to indicate both a telecommunication administration and a recognized operating agency.

ID tag requirements for infrastructure and network elements management Study Group 6

ICS
CCS
M01
发布
2007-02-01
实施

The ITU Radiocommunication Assembly, considering the decisive importance for radiocommunications of the information contained in the ITU-R texts; that a wider dissemination of the information contained in these texts would promote technical progress.

Dissemination of ITU-R texts

ICS
CCS
M01
发布
2007-01-01
实施

Dissemination of ITU-R texts

ICS
CCS
M01
发布
2007-01-01
实施

ITU-T Recommendation X.1112 proposes a certificate profile for authenticating the device in the home network. It also describes how authentication works between devices in the home network with a secure home gateway. In addition, this Recommendation describes the certificate profile standard for home network devices using ITU-T Recommendation X.509 as the basic reference for the device certificate profile. Finally, this Recommendation describes the certificate management procedures for the home device certificate in the home network.

Device certificate profile for the home network (Study Group 17)

ICS
CCS
M01
发布
2007
实施

Some environments necessitate the authentication of the human user rather than a process or a device. In authenticating human users, the authentication system requires human users to prove their uniqueness. Such uniqueness is generally based on various authentication means such as something known, something possessed or some immutable characteristics for each human user.

Guideline on user authentication mechanisms for home network services (Study Group 17)

ICS
CCS
M01
发布
2007
实施

This Recommendation provides guidance regarding transmission impairments introduced by digital speech processing systems. The information provided is for use in conjunction with the transmission planning approach described in [ITU-T G.107], [ITU-T G.108] and [ITU-T G.109]. The impairment factor method, used by the E-model of [ITU-T G.107], is now recommended. The earlier method that used quantization distortion units is no longer recommended. The E-model reflects the combined perceptual effects of different types of impairments on the end-to-end speech transmission performance by using impairment factors. Impairment factors represent the (degrading) contribution of one instrumentally measurable attribute of the connection (e.g., attenuation, loss), or of a complete piece of equipment (e.g., a low bit-rate coding and decoding process) on the overall quality as experienced by the user. This degradation is called an "impairment factor" in a general sense, and "equipment impairment factor" when it is related to the degradations due to a specific piece of equipment. The E-model is highly useful because it combines the effects of different impairment factors. Network and service planners who are concerned with end-to-end speech transmission performance can use impairment factors with the E-model to assess the effects of introducing speech processing technologies.

Transmission impairments due to speech processing Study Group 12

ICS
CCS
M01
发布
2007
实施

This is an amendment to the NOTE under Figure 7.Framework for Service Management Operational requirements Service Management

Framework for service management operational requirements Service management Amendment 1 Study Group 2

ICS
CCS
M01
发布
2007
实施

This Recommendation defines designations and additional information intended primarily for human-to-human communication between various Operators, i.e., network operators or service providers. This Recommendation contains data definitions for designations of interconnections and other information about network resources that are required to be communicated between operators. This Recommendation is developed in order to facilitate computerized interoperation between telecommunication operators. For this use a more formal approach than M.1400 is required. See Appendix III.

Formalization of interconnection designations among operators' telecommunication networks

ICS
CCS
M01
发布
2006-07-01
实施

Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Review of available material on QoS requirements of Multimedia Services (V1.1.1)

ICS
CCS
M01
发布
2006-02-01
实施

This Recommendation defines the requirements and functionality needed to support Accounting functions within this release of the IPCablecom2 Architecture. The main focus is to define how the collection of usage data is done to assure that the required billing functions can be supported, though usage data may also be used for other purposes (e.g., network or service trend analysis, network planning, and traffic engineering). In addition, this Recommendation details the various accounting events and their associated attributes.

IPCablecom2 data collection to support accounting

ICS
CCS
M01
发布
2006
实施

本标准规定了军用通信装备随机文件(以下简称配套文件)的种类、编写要求、编制格式、出版印刷、配发和使用等要求。 本标准适用于军用通信装备配套文件。

Configuration and applied requirements of document provided for the military communication equipment

ICS
CCS
M01
发布
2005-10-02
实施
2006-01-01

本标准规定了卫星在轨测控管理期间,卫星测控中心、卫星应用中心、卫星研制方相互间的接口约定和接口文档编写内容及格式。 本标准适用于卫星在轨测控管理接口约定和接口文档的编写。载人航天器、深空探测器在轨测控管理接口约定和接口文档的编写亦可参照使用。

Requirement for satellite in-orbit TT&C management interface documents

ICS
CCS
M01
发布
2005-06-28
实施
2005-10-01

ITU-T Rec.G.727 contains the specification for the embedded adaptive differential PCM voicecoding algorithm at 16, 24, 32, and 40 kbit/s. Its Annex A contains the specification for linear PCM input and output. This corrigendumfixes an omission in Decoder Block LIMO of Annex A/G.727, which limits the output linear two's complement sample to a 14-bit value. The pseudo-code, as originally published, misses the case for reconstructed samples SRFFequal to 57 344.

5-, 4-, 3- and 2-bit/sample embedded Adaptive Differential Pulse Code Modulation (ADPCM) Corrigendum 1: Correction to Annex A: Extensions of Recommendation G.727 for use with uniform-quantized input and output

ICS
CCS
M01
发布
2005-05-01
实施

ITU-T Rec.G.727 contains the specification for the embedded adaptive differential PCM voicecoding algorithm at 16, 24, 32, and 40 kbit/s. Its Annex A contains the specification for linear PCM input and output. This corrigendumfixes an omission in Decoder Block LIMO of Annex A/G.727, which limits the output linear two's complement sample to a 14-bit value. The pseudo-code, as originally published, misses the case for reconstructed samples SRFFequal to 57 344.

5-, 4-, 3- and 2-bit/sample embedded Adaptive Differential Pulse Code Modulation (ADPCM) Corrigendum 1: Correction to Annex A: Extensions of Recommendation G.727 for use with uniform-quantized input and output

ICS
CCS
M01
发布
2005-05-01
实施

This Recommendation provides security requirements, from the point of view of the mobile user and the application service provider in the upper layer of the OSI Reference Model, for mobile end-to-end data communications between a mobile terminal in a mobile network and an application server in an open network.

Framework of security technologies for mobile end-to-end data communications

ICS
CCS
M01
发布
2004-04-01
实施



Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号