Currently sorted By last update ascending Sort chronologically: By last update | By creation date
Digital Cinema Distribution Master (DCDM)
The uncompressed master files for picture, sound, and subtitling. The image DCDM is colorcorrected for Digital Cinema projection and will be used to create the compressed files for Digital Cinema distribution.
see Digital Cinema Package
Digital Cinema Initiatives LCC
Digital Source Master (DSM)
This is the overall movie Master file which is used to create all other master-file versions such as the DCDM for cinema, transferred onto film as the film duplication master, HDTV master, DVD and home video master
Composition Playlist (CPL)
A text file that contains all of the information on how the files for a specific Composition should be played back, including how the audio and subtitles are synchronized with the picture. The CPL could contain one reel or many reels, and there are different CPLs for each soundtrack or version that would play back. The CPL is created by the Digital Cinema Packaging Facility
see Digital Cinema Distribution Master
Composition Playlist (used in TMS) Content Element (used in SMS)
These phrases both refer to the pieces of content of the same type (ie. Trailers, Advertisements) that go towards making up parts of a Show Playlist
See Forensic Mark
Captions (subtitles including cues and sound effects) that are not visible on the screen. Closed captions are seen using a closed caption device and only visible to these audience members. Text content is provided on the DCP.
Picture format with an aspect ratio of 2.39:1. Under the DCI specifications, all projectors must letterbox their imaging chips (which are about 2:1 aspect ratio) to show cinemascope movies. This means that a 2K projector vertical resolution goes down to just 700 pixels which is less than HDTV However, a 4K projector vertical resolution will be 1,400 pixels in cinemascope which is still 1 1/2 times the vertical resolution of HDTV keeping cinema ahead of home entertainment
See High Definition
A signal which is encoded within the picture/audio that is invisible to the human eye/ear. If the movie is copied with a camcorder/stills camera (audio recorder), the pirate copy/still picture/audio can be analysed to extract the forensic mark which will tell which cinema the movie was copied in
A playlist that describes the order of how the Compositions should play back and is typically created by exhibition and transferred to the equipment controlling a particular screen. The exhibitor could have multiple Show Playlists (see picture on cover)
Show Playlist (used in TMS) Content Element (Nested) (used in SMS)
These statements both refer to sequences of content one after another. This sequence can be made up of other Show Playlists, Composition Playlists and Black Frames.
Subtitle using Timed Text
One of the two ways of subtitling in DCinema - subtitles are rendered out during play out at the theatre
Subtitle using Subpictures
One of the two ways of subtitling in DCinema - would be used for the display of special characters like certain Asian characters. Graphics are prerendered for display and are called up on-screen by a script
An Element of Content that will make up part of a Composition Playlist or Show Playlist
SMS -Control Event
A command that will cue an Automation Function
Security Manager (SM)
The controlling device of a security system in either the encoding system, distribution system or the theater playback process.
The number of pixels in an image. DCI specification dictates two resolutions; 2K (2048 x 1080) pixels as the minimum, 4K (4096 x 1080)
Projector Configuration File (PCF)
A file that is put into the TI DCinema projectors in order to configure the projector to a standardized set-up
Like a packing list for deliveries, the Packing List contains the identification of each individual file included in a DCP. This list also includes information about each file that allows the receiver to verify that they have every file in its entirety
The DCI name for what is most often referred to as the server for playing back the movie. It stores the movie and carries out real-time decryption and un-compresses the movie (JPEG2000) and adds an invisible fingerprint into the image.
Link Encryption (LE)
Encrypts the transmission of the content over links between physical devices in exhibition
Link Decryption (LD)
Decrypts the content that has been encrypted by the Link Encryptor
Key Delivery Message (KDM)
Contains all of the keys necessary to allow the playback of a composition on a specific server during a certain time period. The KDM is ordered by a specific CPL ID#. The KDM is delivered separately from the DCP shipment that it is associated with
Key Delivery Message. See Key
Screen Management System (SMS)
The user interface that a theater manager would use to control a single screen's system including start, stop, the creation or selection of a Show Playlist and editing of a Show Playlist. It is required that each auditorium has one SMS.
Electronic data file that allows encrypted movie files to be unlocked. This sent to the cinema to allow the encrypted movie on their server to be opened.
The new compression standard using "wavelet" technology that has been chosen by the DCI for compression of movie files. This replaces the use of MPEG compression in DCI compliant D-cinema
High resolution TV standard of 1920 x 1080 pixels (about 2.1 million pixels per colour) which is very close to the minimum cinema 2K resolution format at 2048 x 1080 pixels (2.2 million pixels per colour). As HDTV expands, it will increasingly threaten those cinemas offering 2Kquality.
Image of 2048 x 1080 pixels giving 2.2 million pixels per colour. It is approximately the same as HDTV at 1920 x 1080 pixels (2.1 million pixels per colour)
Autonomous WLAN Architecture
Autonomous architecture, also known as Fat Access Point or Fat AP architecture, is a form of wireless LAN architecture where all functionality is coded into every access point (wireless termination point).
Available Bit Rate (ABR)
Available Bit Rate (ABR) is the ATM service category that is used by applications, such as critical data transfers, that can dynamically adjust their data transmission rate in response to network feedback. The goal of the ABR service is to allow application access to unused network bandwidth.
Application Layer/Layer 7
In the OSI Reference Model, the Application Layer is Layer 7. It specifies network-related functions for a user application or program to ensure that communication with another application or program over a network is possible. It's important to note that this is not the user interface itself. When a user chooses to read email, transfer a file, or surf the network, the user's software program, such as a Web browser, interacts with the Application Layer. In the Five-Layer Model and the TCP/IP Model, the Application Layer has a broader scope of functionality. In those models, it also includes the functionality of the OSI Reference Model's Presentation Layer (Layer 6) and Session Layer (Layer 5).
ATM Adaption Layer (AAL)
The ATM Adaption Layer (AAL) is responsible for segmenting the packet into fixed-length cells of 48 bytes each. The receiving device reassembles the cells into the original packet.
Asynchronous Transfer Mode (ATM)
Asynchronous transfer mode (ATM) is a Layer 2 WAN protocol that can transport voice, video, and data on the same network with guaranteed performance or quality of service for each type of traffic. Customers can build a Virtual Private Network using ATM.
The Application Layer specifies network-related functions for a user application or program so that communication with another program over a network is possible. It's important to note that this is not the user interface itself. When a user chooses to read email, transfer a file, or surf the network, the user's software program, such as a Web browser, interacts with the Application Layer. In the Five-Layer Model and the TCP/IP Model, the Application Layer also manages encoding, data compression, encryption, and sessions. In the Reference Model, those functions are delegated to the Presentation Layer and Session Layer.
Address resolution is the process of using Layer 3 addresses to determine Layer 2 addresses.
Analog lines are the wires or cables used to carry analog signals, such as those in your home telephone service. Analog lines are typically copper wire and operate at Layer 1 or the Physical Layer. An analog signal is a continuous series of electrical pulses that vary over time, like waves.
Address Resolution Protocol (ARP)
In TCP/IP-based networks, Address Resolution Protocol (ARP) is the protocol that manages the address resolution process.
In a wireless environment, active scanning is when a client probes for a particular network in order to associate with it.
Ack is an abbreviation for Acknowledgement. It is the affirmative response of one device to another in the connection establishment process.
Backward Explicit Congestion Notification (BECN)
Backward Explicit Congestion Notification (BECN) bits are bits in the Frame Relay header used to notify an end station, such as a router, of network congestion. When congestion occurs, Frame Relay switches set the BECN bit to a one in frames going back toward the source of traffic indicating that the sending router should slow down transmission until the congestion subsides.
Byte is a group of 8 bits. It is also known as an octet.
Bursty refers to data that transfers or transmits in short, uneven spurts. LAN traffic is typically bursty.
A broadcast domain is the group of devices that can be reached by sending a frame addressed to the broadcast MAC address.
The broadcast MAC address is a special address used to send data to all devices on the same network. The broadcast MAC address is ffff.ffff.ffff. Other types of MAC addresses include unicast addresses and multicast addresses.
A bridge is a Layer 2 network device that connects two or more physical cable segments to create one larger network. Each side of the bridge becomes a separate collision domain or network segment. So, a bridge can be used to break up a large network into separate collision domains. A bridge builds a MAC address table that it uses to manage traffic flow. When a bridge receives data from an unknown MAC address, it adds that address to its MAC address table and notes the port associated with that address. Then, if a bridge later receives data for that address, it will know on which port it should forward the data. If a bridge receives data for an unknown destination address, it will forward the data on all ports, which is known as flooding. Bridges operate based on reading Layer 2 frame information only. They cannot change Layer 2 addresses, and they do not have any access to Layer 3 data.
A bit is the binary digit used in the binary numbering system. A bit is the most basic information unit that computers use. A single bit is a one or a zero, a true or a false, or an on or an off.