A3 - Authentication Algorithm A3Authentication algorithm used in conjunction with Ki , the authentication key, and RAND , the random number generated in the AuC (Authentication Centr... View more
A3 InterfaceThe A3 interface carries coded user information (voice/data) and signaling information between the Selection / Distribution unit function and the chan... View more
A5 InterfaceA5 Interface The A5 interface carries a full duplex stream of bytes between the IWF (Interworking Function) and the Selection / Distribution unit func... View more
A5/1 - Encryption Algorithm A5/1Algorithm used in the GSM ciphering process between a MS (Mobile Station) and the GSM network. ... View more
A5/2 - Encryption AlgorithmA5/2 A5/2 - Encryption Algorithm A5/2 Algorithm used in the GSM ciphering process between a MS (Mobile Station) and the GSM network. This algorithm is... View more
A7 InterfaceA7 Interface The A7 interface carries signaling information between a source BS (Base Station) and a target BS. ... View more
A8 - Ciphering Key Generating Algorithm A8This algorithm is used in conjunction with Ki , the authentication key, and RAND (Random Number) to generate Kc (Cipher Key). This is used with A5/X t... View more
A8 InterfaceA8 Interface The A8 interface carries user traffic between the BS (Base Station) and the PCF (Packet Control Function). ... View more
A9 InterfaceA9 Interface The A9 interface carries signaling information between the BS (Base Station) and the PCF (Packet Control Function). ... View more
AA - Abbreviated AlertAn Abbreviated Alert is used to remind the subscriber that previously selected alternative routing features are still active. ... View more
AAA - Access, Authorization, and AccountingAuthentication, Authorization and Accounting systems implemented to securely determine the identity and privileges of a user and to track that user's ... View more
AAC - Advanced Audio CodecThe AAC features in both the MPEG-2 and MPEG-4 standards and was designed to be the successor to MP3. As such, AAC can operate using a variety of bitr... View more
AAL - ATM Adaptation LayerProvides a conversion function to and from ATM (Asynchronous Transfer Mode) for various types of information, including voice, video, and data. There ... View more
AAL1 - ATM Adaptation Layer 1The AAL1 adaptation layer is used to support continuous bit rate transmissions with a constant delay. ... View more
AAL2 - ATM Adaptation Layer 2AAL2 supports continuous bit rate transmissions, but also solves the problems of packetization delay and efficiency in the use of bandwidth resources.... View more
AAL5 - ATM Adaptation Layer 5The AAL5 adaptation layer was developed because of concerns about the overhead and performance of the AAL3/4 adaptation layers. The result is a very s... View more
AAR - Authorization Authentication RequestA Diameter message used in the PCC (Policy and Charging Control) framework which allows an Application Function to supply session related information ... View more
AB - Access BurstThis is used by GSM and GPRS mobiles when accessing the system. It is smaller than other transmissions since it is typically transmitted when timing i... View more