- 4G LTE: The next generation of mobile network technology.
- Authentication Mechanism: A way of identifying that a client is who it says it is.
- Back-to-back User Agent (B2BUA): A system in which SIP calls are controlled by a logical or virtual proxy configured for the call.
Bandwidth: How much of available data communications resources are used for signaling and media transmission purposes.
Blacklist: A list of people and devices that never has access to a network, such as known spammers, DoS or DDoS perpetrators.
Border: The point where traffic is handed off from one network to another.
Botnet: A series of hundreds or thousands of zombified computers that take part in a DDoS attack.
- CDMA: A 2G mobile technology protocol used by Verizon.
Codec: A coder/decoder that compresses a digital voice signal, allowing it to use less bandwidth.
Concurrent Sessions Supported: The number of simultaneous calls that an SBC can handle at one time.
CPU Utilization: A way for an SBC to determine what functions it needs to perform in real-time to avoid delays.
- Deconstructed SBCs: Technology that provides functionality in several different chassis/systems.
Denial of Service (DoS) Attacks: An attack originating from a single point that seeks to flood a server or SBC with requests in order to take it out of commission.
Distributed Denial of Service (DDoS) Attacks: An attack originating from a hundreds or thousands of zombified computers that seek to flood a server or SBC with requests in order to take it out of commission.
Dual Stacking: When an SBC contains network stack software for both IPv4 and IPv6.
- Electronic Number Mapping System (ENUM): Also known as telephone number mapping, it is designed to map between traditional telephone numbers and IP addresses so calls can get through even when placed on traditional phones.
Encryption: Cryptographic scrambling to both the signaling SIP and the media portion of a call for the purpose of scrambling data.
- Firewall: A device installed at the edges of a network, designed to allow only appropriate traffic to reach within the network.
- Greylist: A list of people and devices that sometimes have access to the network, as determined by network administrators.
GSM: A 2G mobile technology protocol used by AT&T.
- High-Definition (HD) Voice: Technology representing a greater range of frequency at a higher clarity.
- Internet Engineering Task Force (IETF): A global community of engineers that set the SIP standard.
Internet Protocol (IP): IP or TCP/IP is a set of standards for transmitting any form of data – including voice and video – via packets over the Internet.
Internet Protocol Version 6 (IPv6): A newer version of Internet Protocol that will replace the current IPv4, eliminating the need for NAT.
- Jitter: The variance in latency over time.
- Latency: The delay imposed on calls due to factors such as network transmission, call routing and transcoding.
- Narrowband Codec: A codec used in traditional VoIP calls that cuts off both the top and bottom frequencies normally found in a person’s voice.
Network Address Translation (NAT): A technology service that translates between a single public IP address and the private IP addresses that your router assigns to associated devices.
- Packets: Chunks of data.
Policies: A set of rules to determine how each incoming and outgoing call is handled, governing network decisions.
Ports: Communications channels.
Presence: A telecom status message that lets your contacts know where you are and what kind of communications you’re available to participate in.
Private Branch Exchange (PBX): A switch located within a business, including contact centers, that feeds or transmits calls (circuit-switched or VoIP) to and from customers.
Public Switched Telephone Network (PSTN): Circuit-switched voice and data (i.e., callers and called parties) are connected and interact over via a continuous electrical circuit delivered by traditional carriers.
- Redundancy: A lack of single points of failure.
Registration Rate: How many clients the SBC can register in a fixed amount of time.
Registration Storms: When thousands or millions of devices attempt to register with a SIP server all at once in a VoIP Network.
Routers: Switches that connect VoIP and IP data and video traffic to contact center agents and other users.
- Secure Real-Time Transport Protocol: A technology that allows a high level of security between a border controller and target device.
Service Level Agreement (SLA) Compliance: An agreement between customer and carrier.
Service theft and Fraud: Attacks occurring when a hacker accesses and inadequately secured VoIP system to route traffic across the network without paying for it.
Session: Communications between two end devices on a network.
Session Admissions Control: The process of determining who has access to a network and who doesn’t.
Session Border Controller (SBC): Controls a network by admitting or not admitting, and then directing communications between two end devices on the network, like a VoIP call between two phones or the connection between the browser on a tablet and a Web server.
Session Control Protocol: Handles the dialing and hanging up of the connection between two ends of a VoIP call.
SIP: Session Initiation Protocol (SIP) is a set of standards that define the setting up and tearing down of VoIP calls, enabling VoIP traffic to be transmitted via carriers and/or over networks.
Spoofing: A type of attack that occurs when people deliberately modify or disguise their identities on the network with the intent of intercepting calls intended for another party.
Speech Recognition: An automated voice system technology that “translates” voices into computer instructions and responds with pre-recorded voices to provide pre-written answers and agent opt-outs.
- Time-Division Multiplexing (TDM): A more traditional voice technology used in legacy, fixed phones.
Topology: The architecture of the network.
Tone Detection: The ability to recognize and act on standard analog touch tones.
Transcoding: The act of changing codecs as sessions pass through an SBC.
Transport Layer Security: A technology that allows a high level of security between a border controller and target device.
Transrating: Reducing the bit rate of a transmission, sometimes at the expense of audio/video quality.
Trunk: A communications line (PSTN or SIP) between the carriers and their PBXs or routers.
- Unified Communications (UC): IP-based software that incorporates and integrates routing, presence, messaging, conference calling and collaboration in all channels, including but not limited to voice, text and video.
- Virtual Private Network (VPN): A private and secured network connection carved out of a shared or public telecommunications facility using encryption and authentication.
Voice over Internet Protocol (VoIP): A combination of methodologies, communications protocols, and transmission technologies enabling the delivery of voice communications over private or public IP networks.
VoIP Backhaul: When one or both ends of a call are converted to/from more traditional voice technologies.
VPN Tunnel: A virtual private connection on a public/shared network.
- Whitelist: A list of people and devices that always have access to the network.
Wideband Codec: A codec used in HD voice deployments that has a greater range of frequencies at higher clarity.