DCF - Distributed Coordination FunctionThe Distributed Coordination Function forms the basis of standard CSMA/CA (Carrier Sensing Multiple Access / Collision Avoidance) access within an 802... View more
DCH - Dedicated Control ChannelA portion of a Traffic Channel (Forward or Reverse) that carries a combination of user data, signaling , and power control information. ... View more
DCI - Downlink Control InformationThe E-UTRA Downlink Control Information is part of the LTE air interface and is used to carry uplink grant, downlink scheduling, uplink power control ... View more
DCID - Destination Channel IdentifierThe Destination Channel Identifier is used in the Bluetooth system. The purpose of the DCID is to enable the remote side to associate the established ... View more
DCN - Dedicated Core NetworksDCNs are deployed by mobile service providers to serve specific subsets of subscribers, such as in support of a widescale IoT deployment or a large en... View more
DCOM - Distributed Component Object ModelThe Distributed Component Object Model is a protocol that enables software components to communicate directly over a network. Developed by Microsoft a... View more
DCS1800 - Digital Cellular System 1800MHzDigital Cellular System 1800MHz is a term given to what is now known as GSM1800. This system operates in the 1800MHz region of the frequency spectrum.... View more
DDoS - Distributed Denial of ServiceThis type of attack uses a Botnet in order to facilitate a DoS attack which has many different sources. All members of the Botnet are instructed by a ... View more
DECT - Digital Enhance Cordless TelecommunicationDigital Enhanced Cordless Technology uses the 20MHz of spectrum between 1880MHz and 1900MHz, DECT provides 120 duplex channels to provide wireless spe... View more
Dedicated modeDedicated mode In this mode the GSM mobile is allocated a dedicated physical channel. ... View more
Deep WebThe Deep Web forms the majority of the information currently stored and accessed using the World Wide Web (the Deep Web constitutes approximately 90% ... View more
Default RouterA default router is the default gateway used by the device to access hosts on other networks. It is also called the default gateway. ... View more
DelayA parameter describing service speed. The time difference between the instant at which the first bit of a PDU (Protocol Data Unit) crosses one designa... View more
DES - Data Encryption StandardDES is a symmetric key encryption algorithm that is now widely considered to be insecure for most applications due to the short 56bit key length.... View more
Designated Access ModeA mode of operation on the Reverse Common Control Channel where the MS (Mobile Station) responds to requests received on the Forward Common Control Ch... View more
Device DiscoveryThe Device Discovery procedure allows a Bluetooth device to request and receive information from other Bluetooth devices. The information received inc... View more
Device NameThe Device Name is a Bluetooth friendly name. It is made available to other devices during device discovery.... View more
DFT - Discrete Fourier TransformThe DFT (Discrete Fourier Transform) is a form of Fourier analysis. It transforms one function into another, which is called the frequency domain repr... View more
DH - Data-High RateThe DH (Data High Rate) indicates a Bluetooth ACL (Asynchronous Connectionless Link) data packet type for high rate data. Three types of ACL packets a... View more
DH - Diffie-Hellman Key ExchangeThe Diffie-Hellman Key Exchange is the process in which cryptographic keys may be distributed between communicating parties across a public IP network... View more