ISACA Glossary of Terms English-Spanish

Total Page:16

File Type:pdf, Size:1020Kb

ISACA Glossary of Terms English-Spanish ISACA® Glossary of Terms English-Spanish Third edition (2015) ACKNOWLEDGMENTS The ISACA® Glossary of Terms has been translated into Spanish (terms only) by a professional translation vendor and reviewed by many volunteers. The verified and approved translation of this glossary will help reduce the time, cost, and inconsistencies of ISACA Spanish translations. All of the ISACA members who participated in the review of the three editions of the translated glossary deserve our thanks and gratitude. Expert Translation Reviewers Alfonso Javier Mateluna Concha, CISA, CISM, CRISC, Chile Arnoldo Altamirano, CISA, Costa Rica Daniel Morales, CISA, Costa Rica Edson Marcelo Vittoriano Piuzzi, Sr., CISM, Chile Fabiola Paulina Moyón Constante, CISA, Ecuador Freddy Grey, CISA, CISM, Chile Jorge Serrano, CISA, CGEIT, CRISC, Chile Juan Davila Ramirez, CISA, CISM, Peru Larry Llirán, CISA, CISM, Puerto Rico Lolita E. Vargas-DeLeon, CISA, CIA, CPA, MIBA, Puerto Rico Luis A. Capua, CISM, CRISC, Argentina Luis Diego León, CISA, Costa Rica Luis Enrique Sánchez Crespo, Spain Marcelo Hector Gonzalez, CISA, CRISC, Argentina Marco Gámez, CISA, CRISC, Costa Rica Maria Patricia Prandini, CISA, CRISC, Argentina Pablo Caneo, CISA, CGEIT, CRISC, Chile Pablo Fernández, CISA, CRISC, Costa Rica Reyna Ramirez Montes, Mexico Salomon Rico, CISA, CISM, CGEIT, Mexico Sergio Molanphy, CISM, CRISC, Chile Victor Adalmer Vasquez Mejia, CISA, CISM, CRISC, Colombia FEEDBACK Please contact the ISACA Translation Manager at [email protected] for any comments or suggested changes. Abend A Accountability The ability to map a given activity or event back to the responsible party SPANISH: Responsabilidad de rendición de cuentas Abend An abnormal end to a computer job; termination of a task prior to its completion because of an error Accountability of governance Governance condition that cannot be resolved by recovery facilities ensures that enterprise objectives are achieved by while the task is executing evaluating stakeholder needs, conditions and options; SPANISH: Terminación anormal setting direction through prioritization and decision making; and monitoring performance, compliance and Acceptable interruption window The maximum progress against plans. In most enterprises, governance is period of time that a system can be unavailable before the responsibility of the board of directors under the compromising the achievement of the enterprise's leadership of the chairperson. Scope Note: COBIT 5 business objectives Perspective SPANISH: Ventana de interrupción aceptable SPANISH: Rendición de cuentas por Gobierno Acceptable use policy A policy that establishes an Accountable party The individual, group or entity agreement between users and the enterprise and defines that is ultimately responsible for a subject matter, process for all parties' the ranges of use that are approved before or scope Scope Note: Within the IT Assurance gaining access to a network or the Internet Framework (ITAF), the term "management" is equivalent SPANISH: Política de uso aceptable to "accountable party." SPANISH: Parte responsable Access control The processes, rules and deployment mechanisms that control access to information systems, Acknowledgment (ACK) A flag set in a packet to resources and physical access to premises indicate to the sender that the previous packet sent was SPANISH: Control de acceso accepted correctly by the receiver without errors, or that the receiver is now ready to accept a transmission SPANISH: Reconocimiento (ACK) Access control list (ACL) An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer Active recovery site (Mirrored) A recovery terminals Scope Note: Also referred to as access control strategy that involves two active sites, each capable of tables taking over the other's workload in the event of a disaster SPANISH: Lista de control de acceso (ACL) Scope Note: Each site will have enough idle processing power to restore data from the other site and to accommodate the excess workload in the event of a Access control table An internal computerized disaster. table of access rules regarding the levels of computer SPANISH: Sitio de recuperación activo (espejado) access permitted to logon IDs and computer terminals SPANISH: Tabla de control de acceso Active response A response in which the system either automatically, or in concert with the user, blocks or Access method The technique used for selecting otherwise affects the progress of a detected attack Scope records in a file, one at a time, for processing, retrieval or Note: Takes one of three forms: amending the storage. environment, collecting more information or striking The access method is related to, but distinct from, the file back against the user organization, which determines how the records are SPANISH: Respuesta activa stored. SPANISH: Método de acceso Activity The main actions taken to operate the COBIT process Access path The logical route that an end user takes SPANISH: Actividad to access computerized information Scope Note: Typically includes a route through the operating system, telecommunications software, selected application Address Within computer storage, the code used to software and the access control system designate the location of a specific piece of data SPANISH: Ruta de acceso SPANISH: Dirección Access rights The permission or privileges granted Address space The number of distinct locations that to users, programs or workstations to create, change, may be referred to with the machine address Scope Note: delete or view data and files within a system, as defined For most binary machines, it is equal to 2n, where n is the by rules established by data owners and the information number of bits in the machine address. security policy SPANISH: Espacio de dirección SPANISH: Derechos de acceso Addressing The method used to identify the location Access server Provides centralized access control of a participant in a network Scope Note: Ideally, for managing remote access dial-up services specifies where the participant is located rather than who SPANISH: Servidor de acceso they are (name) or how to get there (routing) SPANISH: Direccionamiento © 2015 ISACA All rights reserved. 2 ISACA® Glossary of Terms – Spanish 3rd Edition Adjusting period Adjusting period The calendar can contain "real" Alignment A state where the enablers of governance accounting periods and/or adjusting accounting periods. and management of enterprise IT support the goals and The "real" accounting periods must not overlap and strategies of the enterprise Scope Note: COBIT 5 cannot have any gaps between them. Adjusting Perspective accounting periods can overlap with other accounting SPANISH: Alineación periods. Scope Note: For example, a period called DEC-93 can be defined that includes 01-DEC-1993 Allocation entry A recurring journal entry used to through 31-DEC-1993. An adjusting period called allocate revenues or costs Scope Note: For example, an DEC31-93 can also be defined that includes only one day: allocation entry could be defined to allocate costs to each 31-DEC-1993 through 31-DEC-1993. department based on head count. SPANISH: Período de ajuste SPANISH: Entrada de asignación Administrative control The rules, procedures and Alpha The use of alphabetic characters or an alphabetic practices dealing with operational effectiveness, character string efficiency and adherence to regulations and management SPANISH: Alfa policies SPANISH: Control administrativo Alternate facilities Locations and infrastructures from which emergency or backup processes are executed, Advanced Encryption Standard (AES) A when the main premises are unavailable or destroyed public algorithm that supports keys from 128 bits to 256 Scope Note: Includes other buildings, offices or data bits in size processing centers SPANISH: Estándar de Encriptación Avanzada (AES) SPANISH: Instalaciones alternativas Advanced persistent threat (APT) An adversary Alternate process Automatic or manual process that possesses sophisticated levels of expertise and designed and established to continue critical business significant resources which allow it to create processes from point-of-failure to return-to-normal opportunities to achieve its objectives using multiple SPANISH: Proceso alternativo attack vectors (NIST SP800-61) Scope Note: The APT: 1. pursues its objectives repeatedly over an extended period of time Alternative routing A service that allows the option 2. adapts to defenders’ efforts to resist it of having an alternate route to complete a call when the 3. is determined to maintain the level of interaction marked destination is not available Scope Note: In needed to execute its objectives signaling, alternative routing is the process of allocating SPANISH: Amenaza persistente avanzada (APT, por sus substitute routes for a given signaling traffic stream in siglas en inglés) case of failure(s) affecting the normal signaling links or routes of that traffic stream. SPANISH: Enrutamiento alternativo Adversary A threat agent SPANISH: Adversario American Standard Code for Information Adware A software package that automatically plays, Interchange See ASCII displays or downloads advertising material to a computer SPANISH: Código Estadounidense Estándar para el after the software is installed on it or while the Intercambio de Información application is being used Scope Note: In most cases, this is done without any notification to the user or without the Amortization The process of cost allocation
Recommended publications
  • Software Product Description and Quickspecs
    VSI OpenVMS Alpha Version 8.4-2L2 Operating System DO-DVASPQ-01A Software Product Description and QuickSpecs PRODUCT NAME: VSI OpenVMS Alpha Version 8.4-2L2 DO-DVASPQ-01A This SPD and QuickSpecs describes the VSI OpenVMS Alpha Performance Release Operating System software, Version 8.4-2L2 (hereafter referred to as VSI OpenVMS Alpha V8.4-2L2). DESCRIPTION OpenVMS is a general purpose, multiuser operating system that runs in both production and development environments. VSI OpenVMS Alpha Version 8.4-2L2 is the latest release of the OpenVMS Alpha computing environment by VMS Software, Inc (VSI). VSI OpenVMS Alpha V8.4-2L2 is compiled to take advantage of architectural features such as byte and word memory reference instructions, and floating-point improvements, which are available only in HPE AlphaServer EV6 or later processors. This optimized release improves performance by taking advantage of faster hardware-based instructions that were previously emulated in software. NOTE: VSI OpenVMS Alpha V8.4-2L2 does not work on, and is not supported on, HPE AlphaServer pre-EV6 systems. OpenVMS Alpha supports HPE’s AlphaServer series computers. OpenVMS software supports industry standards, facilitating application portability and interoperability. OpenVMS provides symmetric multiprocessing (SMP) support for multiprocessing systems. The OpenVMS operating system can be tuned to perform well in a wide variety of environments. This includes combinations of compute-intensive, I/O-intensive, client/server, real-time, and other environments. Actual system performance depends on the type of computer, available physical memory, and the number and type of active disk and tape drives. The OpenVMS operating system has well-integrated networking, distributed computing, client/server, windowing, multi-processing, and authentication capabilities.
    [Show full text]
  • Bit & Baud Rate
    What’s The Difference Between Bit Rate And Baud Rate? Apr. 27, 2012 Lou Frenzel | Electronic Design Serial-data speed is usually stated in terms of bit rate. However, another oft- quoted measure of speed is baud rate. Though the two aren’t the same, similarities exist under some circumstances. This tutorial will make the difference clear. Table Of Contents Background Bit Rate Overhead Baud Rate Multilevel Modulation Why Multiple Bits Per Baud? Baud Rate Examples References Background Most data communications over networks occurs via serial-data transmission. Data bits transmit one at a time over some communications channel, such as a cable or a wireless path. Figure 1 typifies the digital-bit pattern from a computer or some other digital circuit. This data signal is often called the baseband signal. The data switches between two voltage levels, such as +3 V for a binary 1 and +0.2 V for a binary 0. Other binary levels are also used. In the non-return-to-zero (NRZ) format (Fig. 1, again), the signal never goes to zero as like that of return- to-zero (RZ) formatted signals. 1. Non-return to zero (NRZ) is the most common binary data format. Data rate is indicated in bits per second (bits/s). Bit Rate The speed of the data is expressed in bits per second (bits/s or bps). The data rate R is a function of the duration of the bit or bit time (TB) (Fig. 1, again): R = 1/TB Rate is also called channel capacity C. If the bit time is 10 ns, the data rate equals: R = 1/10 x 10–9 = 100 million bits/s This is usually expressed as 100 Mbits/s.
    [Show full text]
  • Intrinsic Parity of Neutral Pion
    Intrinsic Parity of Neutral Pion Taushif Ahmed 13th September, 2012 1 2 Contents 1 Symmetry 4 2 Parity Transformation 5 2.1 Parity in CM . 5 2.2 Parity in QM . 6 2.2.1 Active viewpoint . 6 2.2.2 Passive viewpoint . 8 2.3 Parity in Relativistic QM . 9 2.4 Parity in QFT . 9 2.4.1 Parity in Photon field . 11 3 Decay of The Neutral Pion 14 4 Bibliography 17 3 1 Symmetry What does it mean by `a certain law of physics is symmetric under certain transfor- mations' ? To be specific, consider the statement `classical mechanics is symmetric under mirror inversion' which can be defined as follows: take any motion that satisfies the laws of classical mechanics. Then, reflect the motion into a mirror and imagine that the motion in the mirror is actually happening in front of your eyes, and check if the motion satisfies the same laws of clas- sical mechanics. If it does, then classical mechanics is said to be symmetric under mirror inversion. Or more precisely, if all motions that satisfy the laws of classical mechanics also satisfy them after being re- flected into a mirror, then classical mechanics is said to be symmetric under mirror inversion. In general, suppose one applies certain transformation to a motion that follows certain law of physics, if the resulting motion satisfies the same law, and if such is the case for all motion that satisfies the law, then the law of physics is said to be sym- metric under the given transformation. It is important to use exactly the same law of physics after the transfor- mation is applied.
    [Show full text]
  • Openvms: an Introduction
    The Operating System Handbook or, Fake Your Way Through Minis and Mainframes by Bob DuCharme VMS Table of Contents Chapter 7 OpenVMS: An Introduction.............................................................................. 7.1 History..........................................................................................................................2 7.1.1 Today........................................................................................................................3 7.1.1.1 Popular VMS Software..........................................................................................4 7.1.2 VMS, DCL................................................................................................................4 Chapter 8 Getting Started with OpenVMS........................................................................ 8.1 Starting Up...................................................................................................................7 8.1.1 Finishing Your VMS Session...................................................................................7 8.1.1.1 Reconnecting..........................................................................................................7 8.1.2 Entering Commands..................................................................................................8 8.1.2.1 Retrieving Previous Commands............................................................................9 8.1.2.2 Aborting Screen Output.........................................................................................9
    [Show full text]
  • An Interpreter's Glossary at a Conference on Recent Developments in the ATLAS Project at CERN
    Faculteit Letteren & Wijsbegeerte Jef Galle An interpreter’s glossary at a conference on recent developments in the ATLAS project at CERN Masterproef voorgedragen tot het behalen van de graad van Master in het Tolken 2015 Promotor Prof. Dr. Joost Buysschaert Vakgroep Vertalen Tolken Communicatie 2 ACKNOWLEDGEMENTS First of all, I would like to express my sincere gratitude towards prof. dr. Joost Buysschaert, my supervisor, for his guidance and patience throughout this entire project. Furthermore, I wanted to thank my parents for their patience and support. I would like to express my utmost appreciation towards Sander Myngheer, whose time and insights in the field of physics were indispensable for this dissertation. Last but not least, I wish to convey my gratitude towards prof. dr. Ryckbosch for his time and professional advice concerning the quality of the suggested translations into Dutch. ABSTRACT The goal of this Master’s thesis is to provide a model glossary for conference interpreters on assignments in the domain of particle physics. It was based on criteria related to quality, role, cognition and conference interpreters’ preparatory methodology. This dissertation focuses on terminology used in scientific discourse on the ATLAS experiment at the European Organisation for Nuclear Research. Using automated terminology extraction software (MultiTerm Extract) 15 terms were selected and analysed in-depth in this dissertation to draft a glossary that meets the standards of modern day conference interpreting. The terms were extracted from a corpus which consists of the 50 most recent research papers that were publicly available on the official CERN document server. The glossary contains information I considered to be of vital importance based on relevant literature: collocations in both languages, a Dutch translation, synonyms whenever they were available, English pronunciation and a definition in Dutch for the concepts that are dealt with.
    [Show full text]
  • Tyson Kopczynski
    www.it-ebooks.info Tyson Kopczynski Windows® PowerShell UNLEASHED 800 East 96th Street, Indianapolis, Indiana 46240 USA www.it-ebooks.info Windows® PowerShell Unleashed Editor-in-Chief Copyright © 2007 by Sams Publishing Karen Gettman All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, Senior Acquisitions or otherwise, without written permission from the publisher. No patent liability is Editor assumed with respect to the use of the information contained herein. Although every Neil Rowe precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for Development Editor damages resulting from the use of the information contained herein. Mark Renfrow International Standard Book Number: 0-672-32953-0 Managing Editor Library of Congress Cataloging-in-Publication Data Gina Kanouse Kopczynski, Tyson. Project Editor Microsoft PowerShell unleashed / Tyson Kopczynski. George E. Nedeff p. cm. ISBN 0-672-32953-0 Copy Editor 1. Microsoft Windows (Computer file) 2. Operating systems (Computers) I. Title. Lisa M. Lord QA76.76.O63K66 2007 Senior Indexer 005.4’46—dc22 Cheryl Lenser 2007008894 Proofreader Printed in the United States of America Water Crest First Printing: Publishing 10090807 4321 Contributing Authors Trademarks Pete Handley, Mark All terms mentioned in this book that are known to be trademarks or service marks Weinhardt, and have been appropriately capitalized. Sams Publishing cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the Josh Tolle validity of any trademark or service mark.
    [Show full text]
  • Helicity of the Neutrino Determination of the Nature of Weak Interaction
    GENERAL ¨ ARTICLE Helicity of the Neutrino Determination of the Nature of Weak Interaction Amit Roy Measurement of the helicity of the neutrino was crucial in identifying the nature of weak interac- tion. The measurement is an example of great ingenuity in choosing, (i) the right nucleus with a specific type of decay, (ii) the technique of res- onant fluorescence scattering for determining di- rection of neutrino and (iii) transmission through Amit Roy is currently at magnetised iron for measuring polarisation of γ- the Variable Energy rays. Cyclotron Centre after working at Tata Institute In the field of art and sculpture, we sometimes come of Fundamental Research across a piece of work of rare beauty, which arrests our and Inter-University attention as soon as we focus our gaze on it. The ex- Accelerator Centre. His research interests are in periment on the determination of helicity of the neutrino nuclear, atomic and falls in a similar category among experiments in the field accelerator physics. of modern physics. The experiments on the discovery of parity violation in 1957 [1] had established that the vi- olation parity was maximal in beta decay and that the polarisation of the emitted electron was 100%. This im- plies that its helicity was −1. The helicity of a particle is a measure of the angle (co- sine) between the spin direction of the particle and its momentum direction. H = σ.p,whereσ and p are unit vectors in the direction of the spin and the momentum, respectively. The spin direction of a particle of posi- tive helicity is parallel to its momentum direction, and for that of negative helicity, the directions are opposite (Box 1).
    [Show full text]
  • Parity Alternating Permutations Starting with an Odd Integer
    Parity alternating permutations starting with an odd integer Frether Getachew Kebede1a, Fanja Rakotondrajaob aDepartment of Mathematics, College of Natural and Computational Sciences, Addis Ababa University, P.O.Box 1176, Addis Ababa, Ethiopia; e-mail: [email protected] bD´epartement de Math´ematiques et Informatique, BP 907 Universit´ed’Antananarivo, 101 Antananarivo, Madagascar; e-mail: [email protected] Abstract A Parity Alternating Permutation of the set [n] = 1, 2,...,n is a permutation with { } even and odd entries alternatively. We deal with parity alternating permutations having an odd entry in the first position, PAPs. We study the numbers that count the PAPs with even as well as odd parity. We also study a subclass of PAPs being derangements as well, Parity Alternating Derangements (PADs). Moreover, by considering the parity of these PADs we look into their statistical property of excedance. Keywords: parity, parity alternating permutation, parity alternating derangement, excedance 2020 MSC: 05A05, 05A15, 05A19 arXiv:2101.09125v1 [math.CO] 22 Jan 2021 1. Introduction and preliminaries A permutation π is a bijection from the set [n]= 1, 2,...,n to itself and we will write it { } in standard representation as π = π(1) π(2) π(n), or as the product of disjoint cycles. ··· The parity of a permutation π is defined as the parity of the number of transpositions (cycles of length two) in any representation of π as a product of transpositions. One 1Corresponding author. n c way of determining the parity of π is by obtaining the sign of ( 1) − , where c is the − number of cycles in the cycle representation of π.
    [Show full text]
  • Title: Parity Non-Conservation in Β-Decay of Nuclei: Revisiting Experiment and Theory Fifty Years After
    Title: Parity non-conservation in β-decay of nuclei: revisiting experiment and theory fifty years after. IV. Parity breaking models. Author: Mladen Georgiev (ISSP, Bulg. Acad. Sci., Sofia) Comments: some 26 pdf pages with 4 figures. In memoriam: Prof. R.G. Zaykoff Subj-class: physics This final part offers a survey of models proposed to cope with the symmetry-breaking challenge. Among them are the two-component neutrinos, the neutrino twins, the universal Fermi interaction, etc. Moreover, the broken discrete symmetries in physics are very much on the agenda and may occupy considerable time for LHC experiments aimed at revealing the symmetry-breaking mechanisms. Finally, an account of the achievements of dual-component theories in explaining parity-breaking phenomena is added. 7. Two-component neutrino In the previous parts I through III of the paper we described the theoretical background as well as the bulk experimental evidence that discrete group symmetries break up in weak interactions, such as the β−decay. This last part IV will be devoted to the theoretical models designed to cope with the parity-breaking challenge. The quality of the proposed theories and the accuracy of the experiments made to check them underline the place occupied by papers such as ours in the dissemination of symmetry-related matter of modern science. 7.1. Neutrino gauge In the general form of β-interaction (5.6) the case Ck' = ±Ck (7.1) is of particular interest. It corresponds to interchanging the neutrino wave function in the parity-conserving Hamiltonian ( Ck' = 0 ) with the function ψν' = (! ± γs )ψν (7.2) In as much as parity is not conserved with this transformation, it is natural to put the blame on the neutrino.
    [Show full text]
  • HP Openvms Utility Routines Manual
    HP OpenVMS Utility Routines Manual Order Number: BA554-90019 June 2010 This manual describes the OpenVMS utility routines, a set of routines that provide a programming interface to various OpenVMS utilities. Revision/Update Information: This manual supersedes the HP OpenVMS Utility Routines Manual, OpenVMS Alpha Version 8.3. Software Version: OpenVMS Version 8.4 for Integrity servers OpenVMS Alpha Version 8.4 Hewlett-Packard Company Palo Alto, California © Copyright 2010 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Intel and Itanium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. ZK4493 The HP OpenVMS documentation set is available on CD. This document was prepared using DECdocument, Version 3.3-1B. Contents Preface ............................................................ xvii 1 Introduction to Utility Routines 2 Access Control List (ACL) Editor Routine 2.1 Introduction to the ACL Editor Routine ........................... ACL–1 2.2 Using the ACL Editor Routine: An Example ....................... ACL–1 2.3 ACL Editor Routine . ........................................ ACL–2 ACLEDIT$EDIT ...........................................
    [Show full text]
  • The Three Myths of Optical Capacity Scaling How to Maximize and Monetize Subsea Cable Capacity
    WHITE PAPER The Three Myths of Optical Capacity Scaling How to Maximize and Monetize Subsea Cable Capacity MYTH 1 Scaling BAUD RATE increases spectral efficiency, thereby increasing total subsea fiber capacity MYTH 2 Scaling MODULATION ORDER increases spectral efficiency, thereby increasing total subsea fiber capacity MYTH 3 Scaling INTEGRATION has no effect on spectral efficiency or subsea fiber capacity AXES OF SCALABILITY Capacity/wave Capacity/device Baud G/Wave 100 Gbaud 800 Gb/s+ 2.4 Tb/s 600 Gb/s 66 Gbaud 1.2 Tb/s 200 Gb/s 500 Gb/s 33 Gbaud 100 Gb/s Modulation Fiber capacity 6 Carrier SC 1.2 @ 16QAM QPSK 8QAM 16QAM 237.5 GHz 64QAM CS-64QAM Multi-channel Super-channel Gb/s/unit FigureFigure 1: 1: Three The Three axes Axes of opticalof Optical scalability Scaling The Three Axes of Optical Scaling Figure 1 shows the three axes that are needed for optical scaling—baud rate, modulation order and integration. This paper will discuss scaling along each of these axes, but it is important to clarify exactly what is being scaled. There are at least three interpretations: • Increasing the data rate per wavelength • Increasing the capacity per line card or appliance • Increasing the total fiber capacity, or spectral efficiency These can potentially be scaled independently, or in concert as transponder technology evolves. In subsea deployments total fiber capacity, or spectral efficiency, is usually the dominant factor in determining overall network economics, so it becomes extremely important to understand the most effective way to achieve total capacity, especially when scaling baud rate has become a focal point for many dense wavelength-division multiplexing (DWDM) vendors today.
    [Show full text]
  • Quadrature Amplitude Modulation (QAM) Or Amplitude Phase Shift Keying (APSK) S(T ) = a Sin(2Π F T + )
    ΕΠΛ 427: ΚΙΝΗΤΑ ΔΙΚΤΥΑ ΥΠΟΛΟΓΙΣΤΩΝ (MOBILE NETWORKS) Δρ. Χριστόφορος Χριστοφόρου Πανεπιστήμιο Κύπρου - Τμήμα Πληροφορικής Modulation Techniques (Τεχνικές Διαμόρφωσης) Recall (Process and Elements of Radio Transmission) 1 Modulation Demodulation Topics Discussed 2 Digital Modulation Bit rate, Baud rate Basic Digital Modulation Techniques (ASK, FSK, PSK, QAM) Constellation diagrams Factors that influence the choice of Digital Modulation Scheme – Power Efficiency, Bandwidth Efficiency Modulation 3 Message Signal (Data to be transmitted) Carrier signal with frequency fc Controlling the Amplitude of the carrier signal (ASK) Controlling the Frequency of the carrier signal (FSK) Controlling the Phase of the Modulated Signals Modulated carrier signal (PSK) Analog and Digital Signals Αναλογικά και Ψηφιακά Σήματα 4 Means by which data are propagated over a medium (Οι τρόποι με τους οποίους τα δεδομένα διαδίδονται μέσω κάποιου μέσου). An Analog Signal is a continuously varying electromagnetic wave (ένα συνεχόμενο εναλλασσόμενο ηλεκτρομαγνητικό κύμα) that may be propagated over a variety of media: Wire, fiber optic, coaxial, space (wireless) A digital signal is a sequence of discrete voltage pulses (είναι μια αλληλουχία διακριτών παλμών τάσης) that can be transmitted over a wire medium: E.g., a constant positive level of voltage to represent bit 1 and a constant negative level to represent bit 0. Modulation for Wireless Digital Modulation 5 Digital modulation is the process by which an analog carrier wave is modulated to include a discrete (digital) signal. (Ψηφιακή διαμόρφωση είναι η διαδικασία κατά την οποία ένας μεταφορέας αναλογικού σήματος διαμορφώνεται έτσι ώστε να συμπεριλάβει ένα διακριτό (ψηφιακό) σήμα (π.χ., 1 or 0)) Digital modulation methods can be considered as Digital-to- Analog conversion, and the corresponding Demodulation (e.g., at the Receiver) as Analog-to-Digital conversion.
    [Show full text]