Home

Parent Menu

Glossary

Same Level Menu

Glossary 0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Child Menu

 

Search IntelliGrid Site

Questions/Comments

Questions

 

Responses

 

C

 

C: C is a structured, procedural programming language that has been widely used both for operating systems and applications and that has had a wide following in the academic community. [WhatIs.com]. Standardized in ISO/IEC 9899 (replaces ANSI Standard X3.159-1989) and also supported by ANSI docstore: Product: 'Programming Languages - C'

C# (C-sharp): is a new object-oriented programming language from Microsoft, which aims to combine the computing power of C++ with the programming ease of Visual Basic. C# is based on C++ and contains features similar to those of Java.
C# is designed to work with Microsoft's .NET platform. [WhatIs.com]. It has been submitted as a proposed standard to ECMA Visual Studio .NET: C# Introduction

C++: C++ is an object-oriented programming (OOP) language that is viewed by many as the best language for creating large-scale applications. C++ is a superset of the C language. A related programming language, Java, is based on C++ but optimized for the distribution of program objects in a network such as the Internet. Java is somewhat simpler and easier to learn than C++ and has characteristics that give it other advantages over C++. [WhatIs.com] C++ was created by Bjarne Stroustrup released in 1985. Standardized in ISO/IEC 14882:1998 and also available from ANSI docstore: Product: 'Programming languages - C++'..

CA: see Certificate Authority

Cable: 1. An assembly of one or more insulated conductors, or optical fibers, or a combination of both, within an enveloping jacket. Note 1: A cable is constructed so that the conductors or fibers may be used singly or in groups. Note 2: Certain types of communications cables, especially long submarine cables but also terrestrial cables, whether the communications media are metallic or optical fiber, may contain metallic conductors that supply power to repeaters (amplifiers). 2. A message sent by cable, or by any means of telegraphy (including wireless means). [T1 Glossary 2000: Glossary of Telecommunications Terms]

Cable Modem: In CATV systems, a bidirectional high-speed digital communications interface, located on a subscriber's or user's premises, and used, for example, for Internet access or other digital communications. [T1 Glossary 2000: Glossary of Telecommunications Terms]  Because the coaxial cable used by cable TV provides much greater bandwidth than Cat-3 telephone lines, it can also provide much higher speeds. Cable modems can receive data at a peak speed between 4 Mbps and 30 Mbps and send it at 512 Kbps to 10 Mbps. [Common Usage]

Cache memory: A buffer, smaller and faster than main storage, used to hold a copy of instructions and data in main storage that are likely to be needed next by the processor and that have been obtained automatically from main storage. [T1 Glossary 2000: Glossary of Telecommunications Terms]  Every time you visit a web site, your web browser keeps a cached copy of the text and pictures that it will use for faster access if you visit again and the web site has not been changed.

Caching: A method of automatically saving copies of files either in your computer's memory or on its hard disk. Caching enables you to recall previously visited Web sites much more quickly than downloading a new page from the Web.

CAP (Carrierless Amplitude/Phase Modulation) is a proprietary standard implemented by Globespan Semiconductor. While the name specifies that the modulation is ‘carrierless’ an actual carrier is imposed by the transmit band shaping filter through which the outbound symbols are filtered. Hence CAP is algorithmically identical to QAM. Used by HDSL.

Capability: The maximum load that a generating unit, generating station, or other electrical apparatus can carry under specified conditions for a given period of time without exceeding approved limits of temperature and stress.   [DOE Glossary of Electricity Terms]

Capacity: The amount of electric power delivered or required for which a generator, turbine, transformer, transmission circuit, station, or system is rated by the manufacturer.   [DOE Glossary of Electricity Terms]

Capacity (Purchased): The amount of energy and capacity available for purchase from outside the system.   [DOE Glossary of Electricity Terms]

Capacity Charge: An element in a two-part pricing method used in capacity transactions (energy charge is the other element). The capacity charge, sometimes called Demand Charge, is assessed on the amount of capacity being purchased.   [DOE Glossary of Electricity Terms]

Carrier: In a frequency stabilized system, the sinusoidal component of a modulated wave whose frequency is independent of the modulating wave; or the output of a transmitter when the modulating wave is made zero; or a wave generated at a point in the transmitting system and subsequently modulated by the signal; or a wave generated locally at the receiving terminal which when combined with the side bands in a suitable detector, produces the modulating wave. [47CFR] Synonym common carrier.  [T1 Glossary 2000: Glossary of Telecommunications Terms]

Cascading: the uncontrolled successive loss of system elements triggered by an incident at any location. Cascading results in widespread electric service interruption, which cannot be restrained from sequentially spreading beyond an area predetermined by appropriate studies. (NERC "Terms and Their Definitions As Used in the NERC Planning Standards")

Carrier Sense Multiple Access (CSMA): A network control scheme in which a node verifies the absence of other traffic before transmitting. [T1 Glossary 2000: Glossary of Telecommunications Terms]  CDMA is a "spread spectrum" technology, allowing many users to occupy the same time and frequency allocations in a given band/space. As its name implies, CDMA assigns unique codes to each communication to differentiate it from others in the same spectrum. In a world of finite spectrum resources, CDMA enables many more people to share the airwaves at the same time than do alternative technologies.  The CDMA air interface is used in both 2G and 3G networks. 2G CDMA standards are branded cdmaOne and include IS-95A and IS-95B. CDMA is the foundation for 3G services: the two dominant IMT-2000 standards, CDMA2000 and WCDMA, are based on CDMA. [Common Usage]

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): A network control protocol in which (a) a carrier sensing scheme is used, (b) a data station that intends to transmit sends a jam signal, (c) after waiting a sufficient time for all stations to receive the jam signal, the data station transmits a frame, and (d) while transmitting, if the data station detects a jam signal from another station, it stops transmitting for a random time and then tries again. [T1 Glossary 2000: Glossary of Telecommunications Terms]

Carrier Sense Multiple Access/Collision Detection (CSMA/CD): A LAN access method in which contention between two or more stations is resolved by collision detection. When two stations transmit at the same time, they both stop and signal that a collision has occurred. Each then tries again after waiting a predetermined time period, usually several microseconds. See IEEE 802.3.

CASE (Computer-Aided Software Engineering): Acronym for computer-aided software engineering, computer-aided systems engineering. Software used for the automated development of systems software, i.e., computer code. Note 1: CASE functions include analysis, design, and programming. Note 2: CASE tools automate methods for designing, documenting, and producing structured computer code in the desired programming language.  [T1 Glossary 2000: Glossary of Telecommunications Terms]   CASE is the use of a computer-assisted method to organize and control the development of software, especially on large, complex projects involving many software components and people. Using CASE allows designers, code writers, testers, planners, and managers to share a common view of where a project stands at each stage of development. CASE helps ensure a disciplined, check-pointed process. A CASE tool may portray progress (or lack of it) graphically. It may also serve as a repository for or be linked to document and program libraries containing the project's business plans, design requirements, design specifications, detailed code specifications, the code units, test cases and results, and marketing and service plans.   [Common Usage]

Catatonic: Describes a condition of suspended animation in which something is so hung that it makes no response. If you are typing on a terminal and suddenly the computer does not even echo the letters back to the screen, let alone do what you are asking it to, then the computer is suffering from catatonia.  [Common Usage]

Category 1: A cabling standard for basic twisted-pair cabling used in telephone systems. Inadequate for all but voice and low-speed data communication. Maximum data rate is 1 Mbps.   [WhatIs.com]  

Category 2: Suitable for voice and data transmission of up to 4 Mbps. Mainly used in the IBM Cabling System for Token Ring networks.   [WhatIs.com]  

Category 3: The ANSI/EIA/TIA-568 designation for 100-ohm unshielded twisted-pair cables and associated connecting hardware whose characteristics are specified for data transmission up to 16 Mb/s. [T1 Glossary 2000: Glossary of Telecommunications Terms]  Required to have at least three twists per foot . It is now the standard cable in most telephone systems.   [Common Usage]

Category 4: The ANSI/EIA/TIA-568 designation for 100-ohm unshielded twisted-pair cables and associated connecting hardware whose characteristics are specified for data transmission up to 20 Mb/s. [T1 Glossary 2000: Glossary of Telecommunications Terms]   Commonly used for 16-Mbps Token Ring networks.    [WhatIs.com]  

Category 5: The ANSI/EIA/TIA-568 designation for 100-ohm unshielded twisted-pair cables and associated connecting hardware whose characteristics are specified for data transmission up to 100 Mb/s.   [T1 Glossary 2000: Glossary of Telecommunications Terms]  Commonly used for 4 and 16-Mbps Token Ring and 10xxBase-T Ethernet networks. Maximum distances for 10xxbase-T are 100m, 100m, 25m for 10, 100, and 1000Base-T respectively. Standard defined by TIA/EIA-568-A. In TIA/EIA-568-B, Category 5e replaces Category 5.   [WhatIs.com]  

Category 5e: Enhanced Category 5 cable. A eight-conductor (four pairs) cabling standard for UTP/STP wiring with data transmission rates of up to 1000 Mbps. Commonly used in 10, 100, and 1000Base-T Ethernet networks. Maximum distance is 100m for all three types of Ethernet. Handles voice or data at 100MHz over 22 or 24 AWG wire. Addendum 5 to TIA/EIA-568-A specifies enhanced category 5 (category 5e) performance requirements.   [WhatIs.com]  

Category 6: Category 6/class E standards describe a new performance range for unshielded and screened twisted-pair cabling. Category 6/class E is intended to specify the best performance that UTP and STP cabling solutions can be designed to deliver. Category 6/class E is specified in the frequency range of at least 1-250 MHz  with data transmission rates of up to 1000 Mbps.    [WhatIs.com]  

Category 7: The Category 7/class F emerging standards describe a new performance range. Category 7 cables will be “fully shielded”, with individually screened twisted-pairs and an overall shield (SSTP).  Category 7/class F is specified in the frequency range of at least 1-600 MHz  with data transmission rates of up to 1000 Mbps.    [WhatIs.com]  

cc (carbon copy): A copy of an e-mail message sent to a person(s) who is not the primary recipient(s).  [Common Usage]

CCAPI: Control Center Application Program Interface, a group originally sponsored by EPRI to develop the Common Information Model (CIM), and to support the IEC TC57 WG13 development work on IEC 61970, which is the international standardization of CIM and the APIs to CIM components. [IEC61970]

CCITT: Comité Consultatif International Télégraphique et Téléphonique (CCITT) is the French acronym that translates to the International Telegraph and Telephone Consultative Committee. It is an international body centered in Geneva that has created the world wide modem standards.  It renamed itself to ITU-T - International Telecommunications Union: Telecommunications Standards Sector. [Welcome to the International Telecommunication Union]

CDC: Common Data Class

CDMA (Code Division Multiple Access): See Carrier Sense Multiple Access.

CDPD (Cellular Digital Packet Data): CDPD is a specification for supporting wireless access to the Internet and other public packet-switched networks. cellular telephone and modem providers that offer CDPD support make it possible for mobile users to get access to the Internet at up to 19.2 Kbps . Because CDPD is an open specification that adheres to the layered structure of the Open Systems Interconnection (OSI) model, it has the ability to be extended in the future. CDPD supports both the Internet's Internet Protocol protocol and the ISO Connectionless Network Protocol (CLNP). CDPD also supports IP multicast (one-to-many) service. With multicast, a company can periodically broadcast company updates to sales and service people on the road or a news subscription service can transmit its issues as they are published. It will also support the next level of IP, IPv6. [WhatIs.com]

CEFACT: see UN/CEFACT

CERN (Centre Européen de Recherche Nucléaire): CERN is the European Organization for Nuclear Research, the world's largest particle physics centre. Founded in 1954, the laboratory was one of Europe's first joint ventures, and has become a shining example of international collaboration. From the original 12 signatories of the CERN convention, membership has grown to the present 20 Member States. Birthplace of the World Wide Web. http://www.cern.ch

CERT: The Computer Emergency Response Team was established at Carnegie-Mellon University after the 1988 Internet worm attack. http://www.cert.org/

Certificate: 1. In cryptography, the public key and the identity of an entity, with other information, rendered unforgeable by digitally signing the entire information with the private key of the issuing certification authority. [After X9.42] Synonym digital certificate. 2. [A] record holding security information about an information-system (IS) user and vouches to the truth and accuracy of the information it contains. [INFOSEC-99] [T1 Glossary 2000: Glossary of Telecommunications Terms]   A data structure which is digitally signed by some party which users of the certificate will trust. Typically certificates are used for the distribution of public keys for PKI, and are managed by Certificate Authorities. The contents of a certificate include at least the name of the certificate owner, the public key, the expiration date of the certificate, the trusted certificate authority, and the digital signature of the certificate authority.  [Common Usage]

Certification Authority (CA)1. In cryptography, a center trusted by one or more agencies or individuals to create and assign certificates and, optionally, to create user's keys. [After X9.31] 2. In secure communications, a trusted person or entity who issues certificates (also called "public-key certificates") for encryption purposes. 3. An independent party identifying and certifying payers and payees for real-time credit card transactions in electronic commerce. [Mattila] 4. Third level of the Public Key Infrastructure (PKI) Certification Management Authority responsible for issuing and revoking user certificates, and exacting compliance to the PKI policy as defined by-the parent Policy Creation Authority (PCA). [INFOSEC-99]  [T1 Glossary 2000: Glossary of Telecommunications Terms]   Also known as a certificate authority, the CA is an authority in a network that issues and manages security credentials and public keys for message encryption. As part of a public key infrastructure (PKI), a CA checks with a registration authority (RA) to verify information provided by the requestor of a digital certificate. If the RA verifies the requestor's information, the CA can then issue a digital certificate used to create digital signatures and public-private key pairs. Depending on the public key infrastructure implementation, the certificate includes the owner's public key, the expiration date of the certificate, the owner's name, and other information about the public key owner.  List of CAs. List of CAs 2.

Certificate Revocation List (CRL): Certificate Revocation List (CRL) is one of two common methods when using a public key infrastructure for maintaining access to servers in a network. The other, newer method, which has superseded CRL in some cases, is Online Certificate Status Protocol (OCSP). The CRL is exactly what its name implies: a list of subscribers paired with digital certificate status. The list enumerates revoked certificates along with the reason(s) for revocation. The dates of certificate issue, and the entities that issued them, are also included. In addition, each list contains a proposed date for the next release. When a potential user attempts to access a server, the server allows or denies access based on the CRL entry for that particular user. The main limitation of CRL is the fact that updates must be frequently downloaded to keep the list current. OCSP overcomes this limitation by checking certificate status in real time. [WhatIs.com]

CGI (Common Gateway Interface): A specification for transferring information between a World Wide Web server and a CGI program. A CGI program is any program designed to accept and return data that conforms to the CGI specification. The program could be written in any programming language, including C, Perl, Java, or Visual Basic. [W3C: CGI - Common Gateway Interface]

CHAP (Challenge-Handshake Authentication Protocol): is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP). Here's how CHAP works:

  • After the link is made, the server sends a challenge message to the connection requestor. The requestor responds with a value obtained by using a one-way hash function.
  • The server checks the response by comparing it its own calculation of the expected hash value.
  • If the values match, the authentication is acknowledged; otherwise the connection is usually terminated. [WhatIs.com]

CHAP is one of two methods used in a PPP connection to authenticate the user. CHAP uses an encryption method of sending the user name and password and thus more secure than its alternative, PAP. CHAP is defined in IETF RFC 1994.

Characteristic Impedance (Ohms): A value based on the inherent conductance, resistance, capacitance and inductance of a cable that represents the impedance of an infinitely long cable. When the cable is cut to any length and terminated with this Characteristic Impedance, measurements of the cable will be identical to values obtained from the infinite length cable. That is to say that the termination of the cable with this impedance gives the cable the appearance of being infinite length, allowing no reflections of the transmitted signal. If termination is required in a system, the termination impedance value should match the Characteristic Impedance of the cable. [Common Usage]

Chat: A chat room is a Web site, part of a Web site, or part of an online service such as America Online, that provides a venue for communities of users with a common interest to communicate in real time. Forums and discussion groups, in comparison, allow users to post messages but don't have the capacity for interactive messaging. Most chat rooms don't require users to have any special software; those that do, such as Internet Relay Chat (IRC) allow users to download it from the Internet. [WhatIs.com]

Checksum: 1. The sum of a group of data items, which sum is used for checking purposes. Note 1: A checksum is stored or transmitted with the group of data items. Note 2: The checksum is calculated by treating the data items as numeric values. Note 3: Checksums are used in error detecting and correcting. 2. [The] value computed on data to detect error or manipulation during transmission. See hash total. [INFOSEC-99] [T1 Glossary 2000: Glossary of Telecommunications Terms

CIM: Common Information Model

Cipher: 1. Any cryptographic system in which arbitrary symbols, or groups of symbols, represent units of plain text or in which units of plain text are rearranged, or both. [INFOSEC-99] 2. The result of using a cipher. Note: An example of a cipher is an enciphered message or text. [T1 Glossary 2000: Glossary of Telecommunications Terms]  Examples of ciphers are; AES, DES, 3DES, IDEA, RC4, and RSA.

Circuit: A conductor or a system of conductors through which electric current flows.   [DOE Glossary of Electricity Terms]

Circuit Switching: A type of communications in which a dedicated channel (or circuit) is established for the duration of a transmission. The Telephone system is using circuit switching with different multiplexing; e.g., TDM, FDM. See also ISDN.

CIS (Component Interface Specification): specifies the functional requirements for interfaces that a component (or application) should implement to be able to exchange information with other components (or applications) and/or to access publicly available data in a standard way. Parts 4 and 5 of the IEC 61970 international standard specify the CIS for the CIM. [IEC61970]

CIS (Customer Information System): usually containing customer addresses, billing information, and sometimes the connection between a customer and a distribution transformer. [Common Usage]

Class: A class is a set of objects that share a common structure and common behavior (the same attributes, operations, relationships and semantics). [IEC61850-2]  In object-oriented programming, a class is a template definition of the methods and variables in a particular kind of object. Thus, an object is a specific instance of a class; it contains real values instead of variables. The class is one of the defining ideas of object-oriented programming. Among the important ideas about classes are:

  • A class can have subclasses that can inherit all or some of the characteristics of the class. In relation to each subclass, the class becomes the superclass.
  • Subclasses can also define their own methods and variables that are not part of their superclass.
  • The structure of a class and its subclasses is called the class hierarchy.

Click: A verb meaning "to select something with a mouse". [Common Usage]

Client: 1. In networking, a software application that allows the user to access a service from a server computer, e.g., a server computer on the Internet or a LAN. 2. A computer, e.g., a desktop computer on a LAN, that is so served.  [T1 Glossary 2000: Glossary of Telecommunications Terms]     A client is the requesting program or user in a client/server relationship. For example, the user of a Web browser is effectively making client requests for pages from servers all over the Web. The browser itself is a client in its relationship with the computer that is getting and returning the requested HTML file. The computer handling the request and sending back the HTML file is a server.   [WhatIs.com]

Client Program: A computer program that connects to a server and communicates to a specific server program. e-mail is an example. The e-mail client connects to the e-mail server to send and receive e-mail messages.

Client/Server: Any hardware / software combination that generally adheres to a client-server architecture, regardless of the type of application. [T1 Glossary 2000: Glossary of Telecommunications Terms]     Client/server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request. Although the client/server idea can be used by programs within a single computer, it is a more important idea in a network. In a network, the client/server model provides a convenient way to interconnect programs that are distributed efficiently across different locations.    [WhatIs.com]

Client/Server Architecture: Any network-based software system that uses client software to request a specific service, and corresponding server software to provide the service from another computer on the network.  T1 Glossary 2000: Glossary of Telecommunications Terms]

CLNS: Connectionless Network Service.  A network service that transfers information between end users without establishing a logical connection or virtual circuit between those specific users. [After T1.110-1987] T1 Glossary 2000: Glossary of Telecommunications Terms]  CLNP was developed by ISO CLNS is part of OSI, is at Layer 3, and does not require a circuit before transmitting the packet. [ISO]

CLTP: ISO 8602 Connectionless Transport Protocol. [ISO]

Clustering: In computers, clustering is the use of multiple computers, typically PCs or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single highly available system. Cluster computing can be used for load balancing as well as for high availability. Advocates of clustering suggest that the approach can help an enterprise achieve 99.999 availability in some cases. One of the main ideas of cluster computing is that, to the outside world, the cluster appears to be a single system. A common use of cluster computing is to load balance traffic on high-traffic Web sites. A Web page request is sent to a "manager" server, which then determines which of several identical or very similar Web servers to forward the request to for handling. Having a Web farm (as such a configuration is sometimes called) allows traffic to be handled more quickly.   [WhatIs.com]

CMIP: Common Management Information Protocol (CMIP) is a network management protocol built on the Open Systems Interconnection (OSI) communication model. The related Common Management Information Services (CMIS) defines services for accessing information about network objects or devices, controlling them, and receiving status reports.   [WhatIs.com]

CMOT (Common Management Information Protocol over TCP): was at one time an alternative to SNMP. However, it is today labeled "Historic". Defined in RFC1189 (obsoleted RFC1095).

Coaxial Cable: A transmission medium consisting of a conducting core, insulating material and a second conducting sheath. See also RG-8, RG-9, RG-11, RG-58, RG-59, and RG-6.

Cogenerator: A generating facility that produces electricity and another form of useful thermal energy (such as heat or steam), used for industrial, commercial, heating, or cooling purposes. To receive status as a qualifying facility (QF) under the Public Utility Regulatory Policies Act (PURPA), the facility must produce electric energy and "another form of useful thermal energy through the sequential use of energy," and meet certain ownership, operating, and efficiency criteria established by the Federal Energy Regulatory Commission (FERC). (See the Code of Federal Regulations, Title 18, Part 292.)   [DOE Glossary of Electricity Terms]

Collaboration Diagram: A diagram that shows interactions organized around the structure of a model, using either classifiers and associations or instances and links. Unlike a sequence diagram, a collaboration diagram shows the relationships among the instances. Sequence diagrams and collaboration diagrams express similar information, but show it in different ways. [OMG UML Spec]

Collision Detection: In LAN technology, the act of detecting when a collision has occurred. This typically occurs when a workstation does not receive an acknowledgment from a receiving station. Collision detection is an integral part of the CSMA/CD access method.  [Common Usage]

Collision: In LAN technology, two stations attempting to use the same transmission medium at the same time.  [Common Usage]

COM (Component Object Model): Microsoft's framework for developing and supporting program component objects. It is aimed at providing similar capabilities to those defined in CORBA. COM provides the underlying services of interface negotiation, life cycle management (determining when an object can be removed from a system), licensing, and event services (putting one object into service as the result of an event that has happened to another object). COM includes COM+, DCOM, MSMQ, MTS, and ActiveX controls. [Microsoft]

COM port: The communications port (serial port) on the back of a computer that allows for devices such as modems to connected and used by the computer. The COM port can also be internal, as specified by the operating system of the computer and the device.  [Common Usage]

COM+: is an extension to the Component Object Model (COM). COM+ is a component object model or an object model with a set of services for COM-based applications. The COM+ architecture integrates COM and MTS, with the following feature areas; Servers, Transactions, Security, Administration, Load Balancing, Queued Components, and Events. [Microsoft]

Combined Cycle: An electric generating technology in which electricity is produced from otherwise lost waste heat exiting from one or more gas (combustion) turbines. The exiting heat is routed to a conventional boiler or to a heat recovery steam generator for utilization by a steam turbine in the production of electricity. This process increases the efficiency of the electric generating unit.   [DOE Glossary of Electricity Terms]

Combined Cycle Unit: An electric generating unit that consists of one or more combustion turbines and one or more boilers with a portion of the required energy input to the boiler(s) provided by the exhaust gas of the combustion turbine(s).   [DOE Glossary of Electricity Terms]

Combined Pumped-Storage Plant: A pumped-storage hydroelectric power plant that uses both pumped water and natural streamflow to produce electricity.   [DOE Glossary of Electricity Terms]

Commercial [Customer]: The commercial sector is generally defined as nonmanufacturing business establishments, including hotels, motels, restaurants, wholesale businesses, retail stores, and health, social, and educational institutions. The utility may classify commercial service as all consumers whose demand or annual use exceeds some specified limit. The limit may be set by the utility based on the rate schedule of the utility. [DOE Glossary of Electricity Terms]

Committee T1:  Established in February 1984, Committee T1 develops technical standards and reports regarding interconnection and interoperability of telecommunications networks at interfaces with end-user systems, carriers, information and enhanced-service providers, and customer premises equipment (CPE). Committee T1 is sponsored by the Alliance for Telecommunications Industry Solutions and accredited by the American National Standards Institute (ANSI) to create network interconnections and interoperability standards for the United States. Committee T1 has six technical subcommittees that are advised and managed by the T1 Advisory Group (T1AG). Each technical subcommittee develops draft standards and technical reports in its designated areas of expertise. The subcommittees recommend positions on matters under consideration by other national and international standards bodies. Technical subcommittees and their areas of expertise are:

T1A1 - Performance and Signal Processing
T1E1 - Interfaces, Power and Protection of Networks
T1M1 - Internetwork Operations, Administration, Maintenance & Provisioning
T1P1 - Wireless/Mobile Services and Systems
T1S1 - Services, Architectures and Signaling
T1X1 - Digital Hierarchy and Synchronization

[T1 Glossary 2000: Glossary of Telecommunications Terms

Common Carrier: In a telecommunications context, a telecommunications company that holds itself out to the public for hire to provide communications transmission services. Note: In the United States, such companies are usually subject to regulation by Federal and state regulatory commissions. Synonyms carrier, commercial carrier, communications common carrier, [and, loosely] interexchange carrier[T1 Glossary 2000: Glossary of Telecommunications Terms]  A provider of telecommunication transmission capabilities available to the general public, regulated by the FCC. [Common Usage]

Common Data Class (CDC): IEC61850 defines common data classes in Part 7-3, which form the basis of all data objects defined in Logical Nodes in Part 7-4. [IEC61850-2]

Common Information Model (CIM) for DMTF: The Common Information Model (CIM) is a computer industry standard for defining device and application characteristics so that system administrators and management programs will be able to control devices and applications from different manufacturers or sources in the same way. For example, a company that purchased different kinds of storage devices from different companies would be able to view the same kind of information (such as: device name and model, serial number, capacity, network location, and relationship to other devices or applications) about each of them or be able to access the information from a program. CIM takes advantage of the Extensible Markup Language (XML). Hardware and software makers choose one of several defined XML schemas (information structures) to supply CIM information about their product. CIM was developed by an industry group, the Distributed (formerly Desktop) Management Task Force (DMTF), as part of an initiative called Web-Based Enterprise Management (WBEM). CIM is intended to be more comprehensive than earlier models now in use, the Simple Network Management Protocol (SNMP) and Desktop Management Interface (DMI). With CIM, relationship information (what's connected to what) can be used to help trace the source and status of problems.   [WhatIs.com]   It should not be confused with the utility power system model standard which is also termed CIM.

Common Information Model (CIM): The CIM is an object model of the utility power system, focused primarily on providing a means for EMS applications to exchange power system data. It was initially developed under the sponsorship of EPRI and now is an international standard (IEC 61970). [IEC61970]

Competitive Transition Charge: A non-bypassable charge levied on each customer of a distribution utility, including those who are served under contracts with nonutility suppliers, for recovery of a utility's transition costs.   [DOE Glossary of Electricity Terms]

Component: A modular, deployable, and replaceable part of a system that encapsulates implementation and exposes a set of interfaces. A component is typically specified by one or more classifiers (e.g., implementation classes) that reside on it, and may be implemented by one or more artifacts (e.g., binary, executable, or script files).   [OMG UML Spec]

Compression: 1. Increasing the amount of data that can be stored in a given domain, such as space, time, or frequency, or contained in a given message length. 2. Reducing the amount of storage space required to store a given amount of data, or reducing the length of message required to transfer a given amount of information. Note 1: Data compression may be accomplished by simply squeezing a given amount of data into a smaller space, for example, by increasing packing density or by transferring data on punched cards onto magnetic tape. Note 2: Data compression does not reduce the amount of data used to represent a given amount of information, whereas data compaction does. Both data compression and data compaction result in the use of fewer data elements for a given amount of information. [T1 Glossary 2000: Glossary of Telecommunications Terms]

Computer Security: 1. Measures and controls that ensure confidentiality, integrity, and availability of information-system (IS) assets including hardware, software, firmware, and information being processed, stored, and communicated. [INFOSEC-99] Synonym automated information systems security. 2. The application of hardware, firmware and software security features to a computer system in order to protect against, or prevent, the unauthorized disclosure, manipulation, deletion of information or denial of service. 3. The protection resulting from all measures to deny unauthorized access and exploitation of friendly computer systems. [JP1-02]  [T1 Glossary 2000: Glossary of Telecommunications Terms]

Concentrator: 1. In data transmission, a functional unit that permits a common path to handle more data sources than there are channels currently available within the path. Note: A concentrator usually provides communication capability between many low-speed, usually asynchronous channels and one or more high-speed, usually synchronous channels. Usually different speeds, codes, and protocols can be accommodated on the low-speed side. The low-speed channels usually operate in contention and require buffering. 2. A device that connects a number of circuits, which are not all used at once, to a smaller group of circuits for economy.  [T1 Glossary 2000: Glossary of Telecommunications Terms]

Confidentiality: 1. Of classified or sensitive data, the degree to which the data have not been compromised; i.e., have not been made available or disclosed to unauthorized individuals, processes, or other entities. [After 2382-pt.8] 2. Assurance that information is not disclosed to unauthorized persons, processes, or devices. [INFOSEC-99] 3. A property by which information relating to an entity or party is not made available or disclosed to unauthorized individuals, entities, or processes. [T1.Rpt22-1993]   [T1 Glossary 2000: Glossary of Telecommunications Terms

Conformance Test:  Check of data flow on communication channels in accordance with the standard conditions concerning access organization, formats and bit sequences, time synchronization, timing, signal form & level and reaction to errors. The conformance test can be carried out and certified to the standard or to
specifically described parts of the standard. The conformance test should be carried out by an ISO 9001 certified organization or system integrator. [IEC61850-2]

Congestion [Power]: A condition that occurs when insufficient transfer capacity is available to implement all of the preferred schedules for electricity transmission simultaneously.   [DOE Glossary of Electricity Terms]

Congestion [Communications]: 1. In a communications switch, a state or condition that occurs when more subscribers attempt simultaneously to access the switch than it is able to handle, even if unsaturated. 2. In a saturated communications system, the condition that occurs when an additional demand for service occurs.  [T1 Glossary 2000: Glossary of Telecommunications Terms]    

Connect Time: The amount of time you are connected to an Internet Service or Internet Service Provider (ISP). [Common Usage]

Connection: 1. A provision for a signal to propagate from one point to another, such as from one circuit, line, subassembly, or component to another. 2. An association established between functional units for conveying information. 3. A temporary concatenation of transmission channels or telecommunication circuits, switching and other functional units set up to provide a route for a transfer of information between two or more points in a telecommunication network. [After T1.506-1989]   [T1 Glossary 2000: Glossary of Telecommunications Terms]      1) In telecommunication and computing in general, a connection is the successful completion of necessary arrangements so that two or more parties (for example, people or programs) can communicate at a long distance. In this usage, the term has a strong physical (hardware) connotation although logical (software) elements are usually involved as well.  2) In computer programming, a connection is the setting up of resources (such as computer memory and buffers) so that a particular object such as a database or file can be read or written to. Typically, a programmer encodes an OPEN or similar request to the operating system that ensures that system resources such as memory are set up, encodes READs and WRITES or similar requests, and then encodes a CLOSE when a connection is no longer needed so that the resources are returned to the system for other users.   [WhatIs.com]  

Connectionless: 1. In a packet-switched network, transmission in which each packet is encoded with a header containing a destination address sufficient to permit the independent delivery of the packet without the aid of additional instructions. Note 1: A packet transmitted in a connectionless mode is frequently called a datagram. Note 2: In connectionless mode transmission of a packet, the service provider usually cannot guarantee there will be no loss, error insertion, misdelivery, duplication, or out-of-sequence delivery of the packet. However, the risk of these hazards' occurring may be reduced by providing a reliable transmission service at a higher protocol layer, such as the Transport Layer of the Open Systems Interconnection--Reference Model. 2. The transmission of a unit of data in a single self-contained operation without establishing, maintaining, and releasing a connection. [After T1.204-1992]   [T1 Glossary 2000: Glossary of Telecommunications Terms]  

Connector: A device for mating and demating electrical power connections or communications media. Note: A connector is distinguished from a splice, which is a permanent joint.  [T1 Glossary 2000: Glossary of Telecommunications Terms]  

Constraint:  A semantic condition or restriction. Certain constraints are predefined in the UML, others may be user defined. Constraints are one of three extensibility mechanisms in UML. See: tagged value, stereotype.   [OMG UML Spec]

Contingency Reserve: Margin of generation for power/frequency control over forecast demand which is required in the defined period to cover against uncertainties in power station availability and against both weather forecast and demand forecast errors. NOTE – This period is usually from 24 hours ahead down to real time.  [IEC_Glossary_1929b.pdf]

Contract Price: Price of fuels marketed on a contract basis covering a period of 1 or more years. Contract prices reflect market conditions at the time the contract was negotiated and therefore remain constant throughout the life of the contract or are adjusted through escalation clauses. Generally, contract prices do not fluctuate widely.   [DOE Glossary of Electricity Terms]

Control Area - Power grid complete with its connected equipment for generation or collection of energy, collaborating according to the rules stipulated by separate regulations, able to offer a lasting maintenance of the specified reliability and qualitative parameters of the energy supply and to meet the conditions in effect in cooperation with the other connected power systems. [Common Usage]

Control Error - In power system operations, the difference between the actual controlled value and its preset level in the given moment of time. [Common Usage]

Controller: A controller is a computer-based entity which monitors and controls a physical device. It may contain calculation and control algorithms, and may be able to perform automatic closed-loop control.  [Common Usage]

Cookie: A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time. (More technically, it is information for future use that is stored by the server on the client side of a client/server communication.) Typically, a cookie records your preferences when using a particular site. Using the Web's Hypertext Transfer Protocol (HTTP), each request for a Web page is independent of all other requests. For this reason, the Web page server has no memory of what pages it has sent to a user previously or anything about your previous visits. Cookies are used primarily in three areas; shopping carts use cookies to keep track of what you are purchasing, dynamic web sites use cookies to modify the site based on your preferences, and finally, some web sites use cookies to keep track of how many times and when you have visited their site.  [WhatIs.com]  

Cooperative Electric Utility: An electric utility legally established to be owned by and operated for the benefit of those using its service. The utility company will generate, transmit, and/or distribute supplies of electric energy to a specified area not being serviced by another utility. Such ventures are generally exempt from Federal income tax laws. Most electric cooperatives have been initially financed by the Rural Electrification Administration, U.S. Department of Agriculture.   [DOE Glossary of Electricity Terms]

Copyright: The legal right of ownership of published materials. Most web sites and the materials contained therein are copyrighted and should only be used with the express permission of the owner.   [Common Usage]

CORBA Common Object Request Broker Architecture is an architecture and specification for creating, distributing, and managing distributed program objects in a network. It allows programs at different locations and developed by different vendors to communicate in a network through an "interface broker." CORBA was developed by a consortium of vendors through the Object Management Group (OMG), which currently includes over 500 member companies. Both International Organization for Standardization (ISO) and X/Open have sanctioned CORBA as the standard architecture for distributed objects (which are also known as components). CORBA 3 is the latest level. The essential concept in CORBA is the Object Request Broker (ORB). ORB support in a network of clients and servers on different computers means that a client program (which may itself be an object) can request services from a server program or object without having to understand where the server is in a distributed network or what the interface to the server program looks like. To make requests or return replies between the ORBs, programs use the General Inter-ORB Protocol (GIOP) and, for the Internet, its Internet Inter-ORB Protocol (IIOP). IIOP maps GIOP requests and replies to the Internet's Transmission Control Protocol (TCP) layer in each computer.   [WhatIs.com]  

Cost-of-Service Regulation: Traditional electric utility regulation under which a utility is allowed to set rates based on the cost of providing service to customers and the right to earn a limited profit.  [DOE Glossary of Electricity Terms]

Cracker: Criminal hacker.   [Common Usage]

Crash and Burn: A spectacular computer crash, named after the suitably tragic car crashes at the end of a lot of bad movies.  [Common Usage]

Crawler (see spider) [Common Usage]

CRC (Cyclic Redundancy Check): 1. An error-detection scheme that (a) uses parity bits generated by polynomial encoding of digital signals, (b) appends those parity bits to the digital signal, and (c) uses decoding algorithms that detect errors in the received digital signal. Note: Error correction, if required, may be accomplished through the use of an automatic repeat-request (ARQ) system. 2. [An] error checking mechanism that checks data integrity by computing a polynomial algorithm based checksum. [INFOSEC-99]    [T1 Glossary 2000: Glossary of Telecommunications Terms]  

Cryptography: 1. [The] art or science concerning the principles, means, and methods for rendering plain information unintelligible, and for restoring encrypted information to intelligible form. [INFOSEC-99] 2. The branch of cryptology that treats of the principles, means, and methods of designing and using cryptosystems.  [T1 Glossary 2000: Glossary of Telecommunications Terms]  

Cryptographic Hash: A mathematical function that maps values from a large (or even very large) domain into a smaller range, and is (a) one-way in that it is computationally infeasible to find any input which maps to any pre-specified output; and (b) collision-free in that it is computationally infeasible to find any two distinct inputs which map to the same output. [After X9.31]   [T1 Glossary 2000: Glossary of Telecommunications Terms]  

CSMA: Carrier Sense Multiple Access

CSMA/CA: Carrier Sense Multiple Access/Collision Avoidance

CSMA/CD: Carrier Sense Multiple Access/Collision Detection

CSS (Cascading Style Sheets): CSS is a style sheet language that allows authors and users to attach style (e.g., fonts, spacing, and aural cues) to structured documents (e.g., HTML documents and XML applications). By separating the presentation style of documents from the content of documents, CSS simplifies Web authoring and site maintenance.  [W3C]

CSU (Channel Service Unit): A line bridging device that (a) is used to perform loop-back testing, (b) may perform bit stuffing, (c) may also provide a framing and formatting pattern compatible with the network, and (d) is the last signal regeneration point, on the loop side, coming from the central office, before the regenerated signal reaches a multiplexer or data terminal equipment (DTE).  [T1 Glossary 2000: Glossary of Telecommunications Terms]  

csv: (comma separated value). An ASCII file of values separated by commas. The commas act as delimiters between values. However, other delimiters could also be used. Usually used when importing or exporting data between applications where a common intelligent format is not available.

Current (Electric): A flow of electrons in an electrical conductor. The strength or rate of movement of the electricity is measured in amperes.   [DOE Glossary of Electricity Terms]

Customer:  Each entity that receives or collects energy according to the agreement signed with the electric utility.  [Common Usage]

Customer Choice: Allowing all customers to purchase kilowatthours of electricity from any of a number of companies that compete with each other.  [DOE Glossary of Electricity Terms]

Customer Information System (CIS): A utility Customer Services system and database, containing the basic customer information, including name, address, telephone, electric service specifics, and billing information on all utility customers. Some CIS systems also contain linkages of the customer site to the power system through a transformer database. See CIS. [Common Usage]

Cyber: "Cyber" is a prefix used to describe a person, thing, or idea as part of the computer and information age. Taken from kybernetes, Greek for "steersman" or "governor," it was first used in cybernetics, a word coined by Norbert Wiener and his colleagues. Common usages include cyberculture, cyberpunk, and cyberspace.   [WhatIs.com]  

Cyberspace: Cyberspace is the total interconnectedness of human beings through computers and telecommunication without regard to physical geography.
William Gibson is sometimes credited with inventing or popularizing the term by using it in his novel of 1984, Neuromancer.    [WhatIs.com]  
.

IntelliGrid Architecture
Copyright EPRI 2004