Browse Definitions :
Definition

CAPI (Common Application Programming Interface)

Contributor(s): Rik Schraag

CAPI (Common Application Programming Interface) is an international standard interface that application s can use to communicate directly with ISDN equipment. Using CAPI, an application program can be written to initiate and terminate phone calls in computers equipped for ISDN. Computer telephony ( CTI ) applications can be written for ISDN users. Officially, CAPI is referred to as Common-ISDN-API and is embodied in ETS 300 838 ("Integrated Service Digital Network (SDN); Harmonized Programmable Communication Interface (HPCI) for ISDN." ETS refers to standards from the European Telecommunication Standards Institute (ETSI). The standard is internationalized by recommendation T.200 "Programmable communication interface for terminal equipment connected to ISDN" from the International Telecommunications Union (ITU).

CAPI can be compared with the Intel-Microsoft "standard" programming interface, the Telephony Application Program Interface ( TAPI ). CAPI includes signaling and data exchange protocol s not included in TAPI. TAPI services are also provided by CAPI and a TAPI application can be mapped to CAPI functions.

Because ISDN is widely used in Germany, the Netherlands, and Scandinavia, users there are accustomed to receiving a CAPI software program or driver along with their ISDN computer card . Not all CAPI driver versions support all functions. CAPI provides functions that are independent from physical signaling protocols that vary among different countries. CAPI supports these protocols: HDLC , HDLC inverted, SDLC , LAPD, X.75, Voice (PCM), Fax group 3 (T.30), V.110/V.120, and compression ( V.xx ).

This was last updated in March 2011

Continue Reading About CAPI (Common Application Programming Interface)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery (DR)

    Disaster recovery (DR) is an area of security planning that aims to protect an organization from the effects of significant ...

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • secondary storage

    Secondary storage is storage for noncritical data that will not be frequently accessed.

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

Close