Home

Parent Menu

Glossary

Same Level Menu

Glossary 0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Child Menu

 

Search IntelliGrid Site

Questions/Comments

Questions

 

Responses

 

T

T is for Transmission

T&D: Transmission and Distribution.

T-1 Line: A digital transmission line that carries up to 1.544 Mbps. See also DS-1.

T-2 Line: A digital transmission line that carries up to 6.312 Mbps. See also DS-2.

T2: Judgment Day, the sequel to the Terminator starring Arnold Schwarzenegger.

T-3 Line: A digital transmission line that carries up to 44.736 Mbps. See also DS-3.

T-4 Line: A digital transmission line that carries up to 274.176 Mbps. See also DS-4.

Tags: The coding used in HTML/SGML to instruct Web browsers on how to display text and images in a Web document. These tags usually operate in pairs surrounding the relevant material. For example, the beginning of a paragraph is signaled by the paragraph tag, <P>, while the end of a paragraph is marked by its matching end tag, </P>. Notice that the end tag is the same as the beginning tag, but with a forward slash mark inserted directly after the “less than” sign. This is typical of tags, though not universal. If your browser allows, you can look at the source coding in the files you view on the Web.

Target of Evaluation (TOE) - Defined in the ISO/IEC JTC 1 SC27 - Security (Common Criteria) from ISO/IEC 15408-1:1999(E) © ISO/IEC - An IT product or system and its associated administrator and user guidance documentation that is the subject of an evaluation.

TASE: Telecontrol Application Service Element

TASE.1: IEC TC57 WG07 standardized the protocol ELCOM. However, this protocol has been rarely used, and TASE.2 is used in its place.

TASE.2: IEC TC57 WG07 standardized the Intercontrol Center Communications Protocol (ICCP) as TASE.2. See ICCP.

TC (Transmission Customer): who bids for and purchases Available Transmission Capacity using the OASIS system.

TCO: (1) Total Cost of Ownership, a model that helps IT professionals understand and manage the budgeted (direct) and unbudgeted (indirect) costs incurred for acquiring, maintaining and using an application or a computing system. TCO normally includes training, upgrades, and administration as well as the purchase price. Lowering TCO through single-point control is a key benefit of Server-based Computing. (2) Tjänstemännens Central Organisation, Swedish union for professionals. Publishes a standard for CRT emissions.  

TCP (Transmission Control Protocol): A transport protocol in the TCP/IP protocol suite.

TCP/IP (Transmission Control Protocol/Internetworking Protocol): A five-layer suite of hierarchical protocols used in an internet.

TDM (Time Division Multiplexing): TDM is a scheme in which numerous signals are combined for transmission on a single communications line or channel. Each signal is broken up into many segments, each having very short time duration. TDM allocates either the same size time windows (synchronous TDM) or variable size time windows (asynchronous TDM).  See also FDM.

TDMA (Time Division Multiple Access): TDMA is used by communication systems which require access by many different users at the same time. These systems are based on a time division multiplexing (TDM) scheme with access assigned to users as needed. In particular, satellite systems, digital cellular phone systems, and some state-of-the-art mobile radio systems use TDMA.

TELNET (Terminal Network): An application layer terminal TCP/IP protocol used to connect and access programs and files on a remote server (remote access). Defined in RFC854.

Terminal Server: A small, specialized, networked computer that connects many terminals to a LAN through one network connection. Any user on the network can then connect to various network hosts.

Text File: A file that consist only of ASCII characters.

TFTP (Trivial File Transfer Protocol): An application layer TCP/IP protocol for file transfer, which does not require complex interaction between client and server. It is often used by servers to boot diskless workstations, X-terminals, and routers. Defined in RFC1350 with updates in RFC1785, RFC2347, RFC2348, and RFC2349. See RFC1123. See UDP/IP. Google directory. Format.

Thick Ethernet: see 10Base5.

Thin Client: A low-cost computing device that works in a server-centric computing model. Thin clients typically do not require state-of-the-art, powerful processors and large amounts of RAM and ROM because they access applications from a central server or network. Thin clients can operate in a Server-based Computing environment.

Thin Ethernet: see 10Base2.

Threaded Messages: On newsgroups, mailing lists, and even normal e-mail, threaded messages are messages that follow a specific conversation about a subject.

Throughput: The number of bits that can pass through a point in one second.

TIA (Telecommunications Industry Association): Telecommunications Industry Association is the leading trade association in the communications and information technology industry with proven strengths in market development, trade promotion, trade shows, domestic and international advocacy, standards development and enabling e-business. Through its worldwide activities, the association facilitates business development opportunities and a competitive market environment. TIA provides a market-focused forum for its more than 1,100 member companies that manufacture or supply the products and services used in global communications. See http://www.tiaonline.org

Time to Live (TTL): See packet lifetime.

Timestamp: An attribute of an object that contains the date and time when the value of the object was last updated.

Timestamping: A field that contains the time that the data was measured or received.

TO: Transmission Owner

Token: A "token" is an authentication tool, a device utilized to send and receive challenges and responses during the user authentication process. Tokens may be small, hand-held hardware devices similar to pocket calculators or credit cards. See key.

Token Bus: A LAN using a bus topology and a token passing access method. An IEEE 802.4 standard.

Token Ring: A LAN using typically a star topology and a token passing access method. An IEEE 802.5 standard. More... and More... IPv6 over Token Ring; RFC 2470.

Total Demand Distortion (TDD): the total root-sum-square harmonic current distortion, in percent of the maximum demand load current (15 or 30 min demand).  [IEEE P1547 Standard for Interconnecting Distributed Resources with Electric Power Systems]

Total Rated-current Distortion (TRD): the total root-sum-square of the current harmonics created by the DR unit operating into a linear balanced load divided by the greater of the load current demand (IL) or the rated current capacity of the DR unit (Irated).  [IEEE P1547 Standard for Interconnecting Distributed Resources with Electric Power Systems]

TP (Transmission Provider): offers Available Transmission Capacity for purchase on the OASIS system.

TransCo: Transmission Company.

Transformer: An electrical device for changing the voltage of alternating current.  [DOE Glossary of Electricity Terms]

Transmission: The movement or transfer of electric energy over an interconnected group of lines and associated equipment between points of supply and points at which it is transformed for delivery to consumers, or is delivered to other electric systems. Transmission is considered to end when the energy is transformed for distribution to the consumer.  [DOE Glossary of Electricity Terms]

Transmission System (Electric): An interconnected group of electric transmission lines and associated equipment for moving or transferring electric energy in bulk between points of supply and points at which it is transformed for delivery over the distribution system lines to consumers, or is delivered to other electric systems.  [DOE Glossary of Electricity Terms]

Transmitting Utility: This is a regulated entity which owns, and may construct and maintain, wires used to transmit wholesale power. It may or may not handle the power dispatch and coordination functions. It is regulated to provide non-discriminatory connections, comparable service, and cost recovery. According to EPACT, this includes any electric utility, qualifying cogeneration facility, qualifying small power production facility, or Federal power marketing agency which owns or operates electric power transmission facilities which are used for the sale of electric energy at wholesale.  [DOE Glossary of Electricity Terms]

Transport Layer Security (TLS): IETF recommendation based on SSL. It is a Public Key Infrastructure (PKI) based protocol used for authenticated and encrypted communication between clients and servers.

Transport Layer: In the OSI model, the network processing entity responsible, in conjunction with the underlying Network, Data Link, and Physical Layers, for the end-to-end control of transmitted data, error recovery, and the optimized use of network resources. 

Trap Door: In the security world, a trap door is a bypass of security purposefully put in place as a means of access for authorized users.

Triple-X: Protocols that are used to connect a dumb terminal with an X.25 network. See also X.3, X.28, and X.29.

Triple DES: DES run 3 times.

Trojan Horse: 1) Any program designed to do things that the user of the program did not intend to do or that disguises its harmful intent. 2) Program that installs itself while the user is making an authorized entry; and, then are used to break-in and exploit the system.

TSB (Telecommunications Systems Bulletin) is published by the TIA.

TTC (Total Transmission Capacity): The total amount of MW energy that can be transmitted across a particular transmission line or path.

Turbine: A machine for generating rotary mechanical power from the energy of a stream of fluid (such as water, steam, or hot gas). Turbines convert the kinetic energy of fluids to mechanical energy through the principles of impulse and reaction, or a mixture of the two. [DOE Glossary of Electricity Terms]

Twisted Pair Ethernet: see 10Base-T, 100Base-T, and 1000BASE-T.

Twisted Pair: Cable made up of a pair of insulated copper wires wrapped around each other to cancel the effects of electrical noise.

Two-Factor Authentication: Two-factor authentication is based on something a user knows (factor one) plus something the user has (factor two). In order to access a network, the user must have both "factors" - just as he/she must have an ATM card and a Personal Identification Number (PIN) to retrieve money from a bank account, In order to be authenticated during the challenge/response process, users must have this specific (private) information.

IntelliGrid Architecture
Copyright EPRI 2004