Get started

Bring yourself up to speed with our introductory content.

Get started

Bring yourself up to speed with our introductory content.

  • voice-to-text

    Voice-to-text is a type of speech recognition program that converts spoken to written language... (Continued) Continue Reading

  • G.729

    G.729 is a standard for Internet Protocol (IP) private branch exchange (PBX) vendors, as well as for the public switched telephone network (PSTN)... (Continued) Continue Reading

  • G.711

    G.711 is the default pulse code modulation (PCM) standard for Internet Protocol (IP) private branch exchange (PBX) vendors, as well as for the public switched telephone network (PSTN). Continue Reading

  • find me / follow me

    Find me and follow me are two call forwarding services that are commonly used in conjunction with each other... (Continued) Continue Reading

  • communication portal

    A communication portal is a service that allows individuals, businesses, schools and government agencies to share information from diverse sources using unified communications (UC) media. The most common modes are e-mail, texting, Voice over IP (... Continue Reading

  • Ethernet/IP (Ethernet Industrial Protocol)

    Ethernet/IP (Ethernet Industrial Protocol) is a network communication standard capable of handling large amounts of data at speeds of 10 Mbps or 100 Mbps, and at up to 1500 bytes per packet.Continue Reading

  • Instant messaging (IM) tutorial

    Instant messaging (IM) has become the communication vehicle of choice for many enterprises. A real-time communication application, IM is essential to unified communications (UC) systems. This comprehensive tutorial details the ins and outs of IM ...Continue Reading

  • communications-enabled business processes (CEBP)

    Communications-enabled business processes (CEBP) is the integration of communications capabilities into software-enabled business procedures, applications and technologies... (Continued)Continue Reading

  • rich presence technology (RPT)

    Rich presence is an enhanced form of presence awareness in which participants can determine if other users are online and if so, observe to a limited extent what they are doing and how they are doing it... (Continued)Continue Reading

  • Videoconferencing tutorial

    Videoconferencing is becoming an increasingly viable tool in the corporate world. Better technology, green IT initiatives and cuts in company travel budgets have contributed to the rise of videoconferencing as a collaborative solution. This ...Continue Reading

  • real-time communications dashboard (RTCD)

    A real-time communications dashboard (RTCD) is an application designed to facilitate efficient, convenient real-time communications (RTC) in a business environment. RTC is any mode of telecommunications in which all users can exchange information ...Continue Reading

  • presence leveraging

    Presence leveraging refers to any technology that supports and expands presence, the ability of a network subscriber to locate and identify any other user's computing device as soon as the other user connects to the network... (Continued)Continue Reading

  • real-time application (RTA)

    A real-time application (RTA) is an application program that functions within a time frame that the user senses as immediate or current. The latency must be less than a defined value, usually measured in seconds... (Continued)Continue Reading

  • SIP tutorial

    Session Initiation Protocol (SIP) is becoming the signalling protocol of choice in the IP telephony, VoIP and unified communications (UC) industries. This comprehensive tutorial details the ins and outs of basic SIP operation, security, ...Continue Reading

  • Intro to SIP packet routing: Using the SIP route header and via header

    In the last of a series of three tips introducing the basics of the Session Initiation Protocol (SIP), Brien Posey discusses the four types of headers SIP employs to ensure that information packets travel the correct path when communicating between ...Continue Reading

  • An introduction to SIP verbs: Register, subscribe, invite

    Part 2 of a three part series on the Session Initiation Protocol, this article discusses commonly used SIP codes and response verbs, and explains basic SIP operation.Continue Reading

  • An introduction to SIP and SIP functions

    The Session Initiation Protocol (SIP) is the primary protocol that's used by most VoIP and unified communications (UC) products. This is part 1 of a three-part series that will explain how SIP works.Continue Reading

  • SDP (Session Description Protocol)

    SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session. In this context, a session consists of a set of communications end points ...Continue Reading

  • CoIP (communications over Internet Protocol)

    CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet. CoIP can be considered an expansion of VoIP (voice over Internet Protocol) to include text, images, video and other forms ...Continue Reading

  • H.245

    H.245 is a protocol for the transmission of call management and control signals in packet-based networks using H.323 equipment.Continue Reading

  • media gateway

    A media gateway is any device, such as a circuit switch, IP gateway, or channel bank that converts data from the format required for one type of network to the format required for another.Continue Reading

  • call control

    Call control is a process that is used in telecommunications networks to monitor and maintain connections once they have been established.Continue Reading

  • call signaling

    Call signaling is a process that is used to set up a connection in a telephone network.Continue Reading

  • call deflection

    Call deflection is a feature of voice over IP (VoIP) that automatically redirects a call from the called endpoint to another endpoint (usually a voice mailbox) when the called endpoint is busy.Continue Reading

  • call detail record (CDR)

    A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount ...Continue Reading

  • dial peer (addressable call endpoint)

    A dial peer, also known as an addressable call endpoint, is a device that can originate or receive a call in a telephone network.Continue Reading

  • VoIP caller ID (Voice over Internet Protocol caller identification)

    VoIP caller ID (Voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in much the same way as caller ID on a conventional telephone line but with enhanced features and flexibility... (Continued)Continue Reading

  • call admission control (CAC)

    Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony)... (Continued)Continue Reading

  • telegraph

    A telegraph is a system in which information is communicated over a wire with a series of electrical current pulses, usually in the form of Morse code. The basic components include a source of direct current, a length of wire or cable, and a ...Continue Reading

  • VoIP trunk gateway

    A VoIP trunk gateway is an interface that facilitates the use of plain old telephone service (POTS) equipment, such as conventional phone sets and fax machines, with a voice over IP (VoIP) network.Continue Reading

  • tcpdump

    Tcpdump is an open source command-line tool for monitoring (sniffing) network traffic.Continue Reading

  • E911 (Enhanced 911)

    In the United States, E911 (Enhanced 91 is support for wireless phone users who dial 911, the standard number for requesting help in an emergency.Continue Reading

  • registration, admission, and status (RAS)

    Registration, admission, and status (RAS) is a component of a network protocol that involves the addition of (or refusal to add) new authorized users, the admission of (or refusal to admit) authorized users based on available bandwidth, and the ...Continue Reading

  • podcasting

    Podcasting is the preparation and distribution of audio files using RSS to the computers of subscribed users. These files may then be uploaded to digital music or multimedia players like the iPod. A podcast can be easily created from a digital ...Continue Reading

  • SPIT (spam over Internet telephony)

    SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.Continue Reading

  • hop off

    Hop off is a term used in telecommunications that refers to a point at which a signal or call leaves a network and moves to another network.Continue Reading

  • Skinny Client Control Protocol (SCCP)

    Skinny Client Control Protocol (SCCP) is a Cisco proprietary standard for terminal control for use with voice over IP (VoIP).Continue Reading

  • presence technology

    Presence technology is a type of application that makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network... (Continued)Continue Reading

  • Carrier Sensitive Routing (CSR)

    Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls... (Continued)Continue Reading

  • hairpinning

    In general telecommunication, hairpinning is returning a message from an origin endpoint back in the direction it came from as a way to get it to its destination endpoint.Continue Reading

  • teleconference

    A teleconference is a telephone meeting among two or more participants involving technology more sophisticated than a simple two-way phone connection.Continue Reading

  • Signalling Connection Control Part (SCCP)

    Signalling Connection Control Part (SCCP) is a portion of International Telecommunication Union (ITU) recommendation Q.711, which is the routing protocol for Signalling System 7 (SS7), a set of protocols used to set up calls in telephony networks.Continue Reading

  • hundred call second or centum call second (CCS)

    The hundred call second -- also known as the centum call second (CCS) -- is a unit of telecommunications traffic density that is the equivalent of one call (including call attempts and holding time) in a specific channel for 100 seconds in an hour.Continue Reading

  • jitter buffer

    In voice over IP (VoIP), a jitter buffer is a shared data area where voice packets can be collected, stored, and sent to the voice processor in evenly spaced intervals.Continue Reading

  • ILEC (incumbent local exchange carrier)

    An ILEC (incumbent local exchange carrier) is a telephone company in the U.S. that was providing local service when the Telecommunications Act of 1996 was enacted.Continue Reading

  • centrex (central office exchange service)

    Centrex (central office exchange service) is a service from local telephone companies in the United States in which up-to-date phone facilities at the phone company's central (local) office are offered to business users so that they don't need to ...Continue Reading

  • VoiceXML

    VoiceXML is an application of the Extensible Markup Language (XML) which, when combined with voice recognition technology, enables interactive access to the Web through the telephone or a voice-driven browser.Continue Reading

  • IP PBX (private branch exchange)

    An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone ...Continue Reading

  • virtual phone number

    A virtual phone number is a telephone number is used to route calls to the user's actual phone number or numbers.Continue Reading

  • regional Bell operating company (RBOC)

    Regional Bell operating company (RBOC) is a term describing one of the U.S. regional telephone companies (or their successors) that were created as a result of the breakup of American Telephone and Telegraph Company (AT&T, known also as the Bell...Continue Reading

  • greenfield deployment

    In networking, a greenfield deployment is the installation and configuration of a network where none existed before, for example in a new office.Continue Reading

  • Q.931

    Q.931 (also called Q93 is a signaling protocol for Integrated Services Digital Network (ISDN) communications that is used in voice over IP (VoIP).Continue Reading

  • Q signaling (QSIG)

    Q signaling (abbreviated QSIG), a protocol for Integrated Services Digital Network (ISDN) communications based on the Q.931 standard, is used for signaling between digital private branch exchanges (PBXs).Continue Reading

  • streaming video

    Streaming video is content sent in compressed form over the Internet and displayed by the viewer in real time.Continue Reading

  • Vonage

    Vonage is a communication platform as a service (CPaaS) provider for consumers and businesses that makes it possible for customers to connect and communicate on any device through cloud-hosted voice, video, chat and short message service (SMS).Continue Reading

  • softphone (soft client telephone)

    A softphone (software telephone) is an application program that enables voice over Internet Protocol (VoIP) telephone calls from computing devices. In the enterprise, softphones are sometimes referred to as soft clients.Continue Reading

  • video telephony

    Video telephony is full-duplex, real-time audio-visual communication between or among end users.Continue Reading

  • voice activation detection (VAD)

    In Voice over IP (VOiP), voice activation detection (VAD) is a software application that allows a data network carrying voice traffic over the Internet to detect the absence of audio and conserve bandwidth by preventing the transmission of "silent ...Continue Reading

  • CLEC (competitive local exchange carrier)

    In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.Continue Reading

  • dedicated line

    A dedicated line is a telecommunications path between two points that is available 24 hours a day for use by a designated user (individual or company).Continue Reading

  • Indefeasible Right of Use (IRU)

    In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.Continue Reading

  • RoundTable

    Microsoft RoundTable is a videoconference device designed to simulate in-person meetings... (Continued)Continue Reading

  • zenware

    Zenware refers to application programs that function with a minimum of superfluous user intervention... (Continued)Continue Reading

  • vishing (voice or VoIP phishing)

    Vishing (voice or VoIP phishing) is an electronic fraud tactic in which individuals are tricked over the phone into revealing critical financial or personal information to unauthorized entities.Continue Reading

  • hyperconnectivity

    Hyperconnectivity is a state of unified communications (UC) in which the traffic-handling capacity and bandwidth of a network always exceed the demand... (Continued)Continue Reading

  • click-to-talk (CTC)

    Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP)...(Continued)Continue Reading

  • VoIP certification credentials

    In this Voice over IP (VoIP) certification survey, we take a look at available certifications that IT pros can obtain to perfect their voice skills.Continue Reading

  • VoIP models and services: Complete guide

    With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs.Continue Reading

  • Hosted and managed VoIP fundamentals

    Adoption rates of hosted VoIP and managed VoIP are increasing as more companies look to reduce the costs and complexities of deploying VoIP in house. Enterprises are factoring revenue growth, enhanced productivity and communication services into ROI...Continue Reading

  • off-peak

    Off-peak, in a call center context, describes a time period with fewer calls than are handled in a busy period... (Continued)Continue Reading

  • inbound call

    An inbound call is one that a customer initiates to a call center or contact center... (Continued)Continue Reading

  • outbound call center

    An outbound call center is one in which call center agents make outbound calls to customers on behalf of a business or client... (Continued)Continue Reading

  • inbound call center

    An inbound call center is one that exclusively or predominately handles inbound calls (calls initiated by the customer) rather than outbound calls... (Continued)Continue Reading

  • Erlang C

    Erlang C is a traffic modeling formula used in call center scheduling to calculate delays or predict waiting times for callers... (Continued)Continue Reading

  • Erlang B

    Erlang B is a modeling formula that is widely used in call center scheduling... (Continued)Continue Reading

  • IAX (Inter-Asterisk Exchange Protocol)

    IAX (Inter-Asterisk Exchange Protocol, pronounced "eeks") is a communications protocol for setting up interactive user sessions... (Continued)Continue Reading

  • packet loss concealment (PLC)

    Packet loss concealment (PLC) is a technology designed to minimize the practical effect of lost packets in digital communications... (Continued)Continue Reading

  • VoIP on MPLS

    While MPLS technology has been around for several years, businesses are now taking advantage of service provider offerings and beginning their own corporate implementations. It's a good idea for network architects and engineers to get a head start ...Continue Reading

  • G.723.1

    G.723.1 is a standard for digital communications that employs 16-bit pulse-code modulation (PCM) at 5.3 or 6.3 kilobits per second (Kbps) with an input sample rate of 8 kilohertz (kHz)... (Continued)Continue Reading

  • voice logger

    A voice logger is a device or program used to record audio information from telephones, radios, microphones and other sources for storage on a computer's hard drive or removable media.Continue Reading

  • What's in a VoIP packet -- An introduction to bandwidth for VoIP

    Learn what makes up a VoIP packet, how headers work, what protocols transport voice traffic over the Internet and how this traffic uses network bandwidth.Continue Reading

SearchNetworking
SearchITChannel
Close