Problem validating identity wireless connection
Are there wireless telecommunications (or network or security) terms or acronyms that you keep hearing, but that whose meanings are unclear to you? Check this alphabetic list of 2,413 wireless telecom terms, including many data networking and security terms as well.
We recommend that you copy only the URL pointing to this page, and not the entire page, as we update it frequently.
You are welcome to incorporate definitions from this page for your own use. You can also highlight a definition by clicking on the word, phrase or acronym in the left column.
You can then click on the button below the index to show only the highlighted term.
The search feature produces a condensed list of terms based on a search pattern.
Search patterns are regular expressions, so stick to single words composed of letters and possibly numbers unless you are familiar with this concept.
To search for multiple words enter text like "(word1|word2)". A warning that most wireless data rates are aggregate, meaning that all users share the bandwidth, and often they are raw rates higher than the actual user throughput could ever be even on an unloaded system.
It is probably good to start by dividing the raw rate by a factor of two to obtain the total user throughput rate and then further divide by the average number of simultaneous users (not connected users, but the number who are likely to be simultaneously transmitting)Advanced Forward Link Trilateration. A fairly efficient method for encapsulation of binary data, designed for M2M applications, defined in an internet draft. Externally-provided synchronizing information for cryptoalgorithms (ciphers) that allows an encryptor at one end to uniquely encrypt each block of content into ciphertext, and yet allows a decryptor at the other end to properly decrypt the ciphertext to yield the original plaintext.
A geolocation technique that utilizes the mobile stations measured time of arrival of radio signals from the base stations (and, possibly, other terrestrial measurements) supported only 3 classes (not counting multicast): A (leading bits 0, 8 bit network number field, providing 128 networks of 16.8 million addresses); B (leading bits 10, 16 bit network number field, providing 16,384 networks of 65,536 addresses); C (leading bits 110, 24 bit network number field, providing 2,097,152 networks of 256 addresses). Cryptosync often takes the form of the output of a binary counter that uses shared bandwidth to service multiple users.
This was generally criticized as too granular (most networks needed more than 256 addresses but less than 65,536 and large networks that needed more than 65,536 probably didnt need 16.8 million! Packet data can be more efficient (except when the overhead of identifying and routing packets is greater than the savings) but the performance is less predictable. A secure and efficient mechanism for distributing and updating Mobile IP (MIP) cryptographic keys in cdma2000 networks (including High Rate Packet Data which is often referred to as 1x EV-DO). A 64 kbps digital link used to carry a single voice conversation or signaling traffic for multiple calls/trunks.
Because the Dynamic Mobile IP Key Update (DMU) procedure occurs at the IP layer directly between the Dialed Number Identification Service. Only useful when multiple numbers terminate at the same location (e.g. In ANSI networks, 8 kbps is usually reserved for in-band signaling (on-hook/off-hook etc.), reducing the bandwidth to 56 kbps Enhanced Observed Time Difference.
A positioning technology based on software within wireless phones combined with their existing signal measurement capabilities.