CUG - Closed User GroupA Closed User Group is a supplementary service offered by network operators. It allows the creation of logical groups of users within the operator's n... View more
CVE - Common Vulnerabilities and ExposuresCommon Vulnerabilities and Exposures is a list of publicly disclosed security vulnerabilities that have been identified. Each vulnerability has a rati... View more
CVSD - Continuous Variable Slope Delta ModulationBluetooth uses a 64Kbps CVSD (Continuously Variable Slope Delta) modulation scheme to code the voice. It is also possible to use standard 64Kbps PCM (... View more
CW - Communication WaitingA supplementary service indicating to a user currently in call that another caller is waiting. ... View more
CW - Contention WindowThis is a term used in IEEE (Institute of Electrical and Electronics Engineers) 802.11 networks which are supporting the QoS (Quality of Service) enha... View more
CWDM - Coarse Wave Division MultiplexingCWDM is the term given to the practice of multiplexing up to eight wavelengths of light down the same piece of optical fibre. This in effect multiplie... View more
D Link - Diagonal linkA Diagonal link connects a secondary (e.g. local or regional) STP (Signalling Transfer Point) pair to a primary (e.g. inter-network gateway) STP pair ... View more
D-channel - Data channelThe D channel is a full duplex, 16Kbps BRI (Basic Rate Interface) or 64Kbps PRI (Primary Rate Interface) ISDN channel used to carry control signals an... View more
D-CSI - Dialled Service – CAMEL Subscription InformationD-CSI is used in a similar way to the O-CSI. The main difference is the O-CSI has a TDP List which when triggered initiates a dialogue with the gsmSCF... View more
D-IM-CSI - Dialled – IP Multimedia – CAMEL Subscription InformationD-IM-CSI is used in a similar way to the O-CSI. The main difference is the O-CSI has a TDP List which when triggered initiates a dialogue with the gsm... View more
D2D - Device to DeviceD2D is a service which allows LTE devices in close proximity to one another to communicate directly. This type of technology is particularly useful fo... View more
DA - Destination AddressThe DA is a term frequently used in the networking realm to signify the recipient of a piece of data. The DA could be in the form of a Layer 2 MAC (Me... View more
DAB - Digital Audio BroadcastingDAB is the technology behind digital radio transmission, employed in numerous countries around the world since 1999 (DAB is also termed Eureka 147). D... View more
DAC - Device Access CodeThe Device Access Code is used during the Bluetooth page, page scan and page response procedures. This code is derived from the devices BD_ADDR (Bluet... View more
DAMPS - Digital Advanced Mobile Phone ServiceWith the initiative to increase the capacity and quality of AMPS (Advanced Mobile Phone Service) some of the AMPS channels were digitized in the DAMPS... View more
Dark WebThe Dark Web equates to approximately 7% of the overall World Wide Web. The Dark Web features websites that are associated with illegal activity, alth... View more
DARPA - Defense Advanced Research Project AgencyDefense Advanced Research Project Agency originally laid out the protocol architecture for today's public Internet including the development of IP (In... View more
dB - DecibelThe Decibel is a unit of comparison, in which the ratio of two power values are expressed using a logarithmic scale usually to the base 10. Although t... View more
dBc.A ratio in Decibels of the sideband power of a signal, measured in a given bandwidth at a given frequency offset from the centre frequency of the sam... View more