Access Restriction

Author Gorn, S.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract This paper gives the considerations of Task Group X3.3.4 in the area of transparent-mode data communication control philosophy. The appearance of this paper was forecast (under the name of “second-level control”) in the earlier tutorial paper, “Control Procedures for Data Communications,” Task Group document X3.3.4.44, dated May 1964.The present paper elaborates upon solutions to the problems of transparency to the basic ASCII communication control characters, as outlined in the previous paper mentioned above. Moreover, it goes on to cover the additional control problems of handling material such as offline encrypted data or non-ASCII codes by means of systems providing complete character transparency. It does not cover concepts of transparency in which the normal character structure or modulation rate of a system may be abandoned.In conjunction with the earlier tutorial paper, this paper is expected to lead to a proposal for standardization of data communication control procedures using the American Standard Code for Information Interchange.
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 8
Issue Number 4
Page Count 4
Starting Page 203
Ending Page 206

Open content in new tab

   Open content in new tab
Source: ACM Digital Library