Browse Definitions :

Voice over IP (VoIP)

Terms related to voice over IP (VoIP), including definitions about communication protocols and words and phrases about making phone calls over the Internet.

1XR - WIR

  • 1xRTT (Single-Carrier Radio Transmission Technology) - 1xRTT (Single-Carrier Radio Transmission Technology) is an operational mode for CDMA2000 wireless communications that specifies a single (1x) 1.
  • analog telephone adapter (ATA) - An analog telephone adaptor (ATA) is a device used to connect a standard telephone to a computer or network so that the user can make calls over the Internet.
  • analog-to-digital conversion (ADC) - Analog-to-digital conversion is an electronic process in which a continuously variable (analog) signal is changed, without altering its essential content, into a multi-level (digital) signal.
  • ATA (Advanced Technology Attachment) - ATA (Advanced Technology Attachment) is the official name that American National Standards Institute group X3T10 uses for what the computer industry calls Integrated Drive Electronics (IDE).
  • auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
  • bring your own bandwidth (BYOB) - Bring your own bandwidth (BYOB) is a voice communications service in which a business purchases the voice services only and uses their own internet connection from their existing internet service provider (ISP) to host the voice service.
  • broadband voice gateway - A broadband voice gateway is a device that allows you to make telephone calls over a high-speed Internet connection rather than through a regular telephone outlet without having to go through your computer.
  • call admission control (CAC) - Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony).
  • call control - Call control is a process that is used in telecommunications networks to monitor and maintain connections once they have been established.
  • call deflection - Call deflection is a feature of voice over IP (VoIP) that automatically redirects a call from the called endpoint to another endpoint (usually a voice mailbox) when the called endpoint is busy.
  • call detail record (CDR) - A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period.
  • call signaling - Call signaling is a process that is used to set up a connection in a telephone network.
  • caller ID spoofing - Caller ID spoofing is a service that allows a caller to masquerade as someone else by falsifying the number that appears on the recipient's caller ID display.
  • CallXML - CallXML is a language based on the Extensible Markup Language (XML) that lets a company describe a phone-to-Web site application in terms of how the call would be handled at the Web site and how it would interact with the caller based on keyed-in or voice responses.
  • click-to-talk (CTC) - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • cloud telephony (cloud calling) - Cloud telephony, also known as cloud calling, is a type of Unified Communications as a Service (UCaaS) that offers voice communication services and connects through a third party host in the cloud.
  • CoIP (communications over Internet Protocol) - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
  • comfort noise generator (CNG) - A comfort noise generator (CNG) is a program used to generate background noise artificially for voice communications during periods of silence that occur during the course of conversation.
  • communication portal - A communication portal is a service that allows individuals, businesses, schools and government agencies to share information from diverse sources using unified communications (UC) media.
  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • CTI (computer-telephony integration) - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
  • data deduplication - Data deduplication -- often called intelligent compression or single-instance storage -- is a process that eliminates redundant copies of data and reduces storage overhead.
  • dial peer (addressable call endpoint) - A dial peer, also known as an addressable call endpoint, is a device that can originate or receive a call in a telephone network.
  • dial peer hunting - Dial peer hunting is a feature of voice over IP (VoIP) systems in which the device at the originating router attempts to find an alternative addressable call endpoint if it cannot establish a connection to the intended endpoint.
  • Distributed Universal Number Discovery (DUNDi) - Distributed Universal Number Discovery (DUNDi) is a peer-to-peer system for translating phone numbers and internal extensions to voice over IP (VoIP) addresses.
  • E911 (Enhanced 911) - In the United States, E911 (Enhanced 91 is support for wireless phone users who dial 911, the standard number for requesting help in an emergency.
  • ear and mouth (E&M) - Ear and mouth (E&M) is a technology in voice over IP (VoIP) that uses a traditional telephone handset with an earphone (or earpiece) for listening to incoming audio and a microphone (or mouthpiece) for transmitting audio.
  • eavesdropping - Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
  • Ethernet as a service (EaaS) - Ethernet as a service (EaaS) is the use of high-bandwidth, fiber optic media such as Packet over SONET (PoS) to deliver 10 Mbps, 100 Mbps or even 1000 Mbps Ethernet service to one or more customers across a common bidirectional broadband infrastructure.
  • federated presence management (FPM) - Federated presence management (FPM), also called unified presence management, is a technology that allows device users to control all aspects of their communications with other users, regardless of the make or platform of the devices.
  • femtocell - A femtocell is a wireless access point that improves cellular reception inside a home or office building.
  • G.711 - G.711 is the default pulse code modulation (PCM) standard for Internet Protocol (IP) private branch exchange (PBX) vendors, as well as for the public switched telephone network (PSTN).
  • G.722 - G.722 is a standard for high-quality digital voice communications that is expected to lead to increased use in Voice over Internet Protocol (VoIP).
  • G.723.1 - G.723.
  • G.729 - G.729 is a standard for Internet Protocol (IP) private branch exchange (PBX) vendors, as well as for the public switched telephone network (PSTN).
  • gigabit Ethernet phone (gigE phone) - A gigabit Ethernet phone, or gigE phone, is a VoIP telephone that connects to and uses gigabit Ethernet transmission technology to communicate with other phones.
  • H.245 - H.245 is a protocol for the transmission of call management and control signals in packet-based networks using H.
  • H.323 - H.323 is a standard approved by the International Telecommunication Union (ITU) in 1996 to promote compatibility in videoconference transmissions over IP networks.
  • hop off - Hop off is a term used in telecommunications that refers to a point at which a signal or call leaves a network and moves to another network.
  • hop on - In telecommunications, hop on refers to a point at which a signal or call enters a network from another network.
  • hot desking - Hot desking is a work space sharing model in which employees outnumber desks.
  • IAX (Inter-Asterisk Exchange Protocol) - IAX (Inter-Asterisk Exchange Protocol, pronounced "eeks") is a communications protocol for setting up interactive user sessions.
  • Information Kit: Voice over IP - What is voice over IP (VoIP)? Expert advice: VoIP certification, Implementing VoIP in a small business, Using VoIP at home.
  • interconnection - Interconnection is a strategy for ensuring that businesses can privately, securely and directly exchange digital information.
  • Internet caller ID - Internet caller ID is an application that allows users to screen incoming telephone calls.
  • IP PBX (private branch exchange) - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • IP telephony (Internet Protocol telephony) - IP telephony (Internet Protocol telephony) is a general term for the technologies that use the Internet Protocol's packet-switched connections to exchange voice, fax, and other forms of information that have traditionally been carried over the dedicated circuit-switched connections of the public switched telephone network (PSTN).
  • jitter - Jitter is the time variation between when packets leave one system and reach another, affecting real-time communications like VoIP and video conferencing.
  • jitter buffer - In voice over IP (VoIP), a jitter buffer is a shared data area where voice packets can be collected, stored, and sent to the voice processor in evenly spaced intervals.
  • Microsoft Assessment and Planning (MAP) Toolkit - Microsoft Assessment and Planning (MAP) Toolkit is a free utility IT can use to determine whether or not its infrastructure is prepared for a migration to a new operating system, server version or cloud-based deployment.
  • network convergence - Network convergence is the efficient coexistence of telephone, video and data communication within a single network.
  • Open Settlement Protocol (OSP) - Open Settlement Protocol (OSP) is a client-server protocol that manages access control, accounting, usage data and inter-domain routing to make it easier for Internet service providers to support IP telephony.
  • Oracle Communications Network Charging and Control (OCNCC) - Oracle Communications Network Charging and Control (OCNCC) is a product from the telecommunications industry used for real-time charging and session control.
  • packet loss concealment (PLC) - Packet loss concealment (PLC) is a technology designed to minimize the practical effect of lost packets in digital communications.
  • port 9875 (port of doom) - Port 9875 is a port often associated with setting up VoIP communications.
  • preamble - A preamble is a signal used in network communications to synchronize transmission timing between two or more systems.
  • push voice - Push Voice is a service that enables functionality normally associated with PBX-based phone systems for cellular phones or other mobile handsets.
  • Q signaling (QSIG) - Q signaling (abbreviated QSIG), a protocol for Integrated Services Digital Network (ISDN) communications based on the Q.
  • Q.931 - Q.931 (also called Q93 is a signaling protocol for Integrated Services Digital Network (ISDN) communications that is used in voice over IP (VoIP).
  • R-value - R-value is a number, or score, that is used to quantitatively express the subjective quality of speech in communications systems, especially digital networks that carry voice over IP (VoIP) traffic, or for which VoIP service is under consideration.
  • real-time communications (RTC) - Real-time communications (RTC) is any mode of telecommunications in which all users can exchange information instantly or with negligible latency.
  • Real-Time Transport Control Protocol (RTCP) - Real-Time Transport Control Protocol (RTCP) is a protocol that works with Real-Time Protocol (RTP) to monitor data delivery on large multicast networks, mainly for streaming media, telephony and video conferencing.
  • Real-Time Transport Protocol (RTP) - The Real-Time Transport Protocol (RTP) is an Internet protocol standard that specifies a way for programs to manage the real-time transmission of multimedia data over either unicast or multicast network services.
  • session border controller (SBC) - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a Voice over Internet Protocol (VoIP) network.
  • Shared Call Appearance (SCA) - Shared Call Appearance (SCA) is the sharing of a VoIP phone number across multiple devices in different locations.
  • SIP trunking (Session Initiation Protocol trunking) - Session Initiation Protocol (SIP) trunking is a service offered by a communications service provider that uses the protocol to provision voice over IP (VoIP) connectivity between an on-premises phone system and the public switched telephone network (PSTN).
  • Skinny Client Control Protocol (SCCP) - Skinny Client Control Protocol (SCCP) is a Cisco proprietary standard for terminal control for use with voice over IP (VoIP).
  • Skype - Skype is an Internet telephony service provider that offers free calling between computers and low-cost calling to regular telephones that aren't connected to the Internet.
  • Skype for Business - Skype for Business, formerly known as Microsoft Lync Server, is a unified communications (UC) platform that integrates common channels of business communication and online meetings, including instant messaging (IM), presence, voice over IP (VoIP), video conferencing, file transfer, web conferencing, voicemail and email.
  • softphone (soft client telephone) - A softphone (software telephone) is an application program that enables voice over Internet Protocol (VoIP) telephone calls from computing devices.
  • softswitch - Softswitch (software switch) is a generic term for any open application program interface (API) software used to bridge a public switched telephone network (PSTN) and Voice over Internet Protocol (VOiP) by separating the call control functions of a phone call from the media gateway (transport layer).
  • SPIT (spam over Internet telephony) - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • SRTP (Secure Real-Time Transport Protocol or Secure RTP) - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • static IP address/dynamic IP address - A static IP address is a number (in the form of a dotted quad) that is assigned to a computer by an Internet service provider (ISP) to be its permanent address on the Internet.
  • terminal proxy server (TPS) - A terminal proxy server (TPS) is a program that acts as an interface for voice over Internet Protocol (VoIP) telephone sets.
  • unified communications (UC) - Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools, with the goal of enhancing business communication, collaboration and productivity.
  • virtual classroom - A virtual classroom is an online learning environment.
  • virtual phone number - A virtual phone number is a telephone number is used to route calls to the user's actual phone number or numbers.
  • vishing (voice or VoIP phishing) - Vishing is an electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized entities.
  • voice activation detection (VAD) - In Voice over IP (VOiP), voice activation detection (VAD) is a software application that allows a data network carrying voice traffic over the Internet to detect the absence of audio and conserve bandwidth by preventing the transmission of "silent packets" over the network.
  • voice portal (vortal) - A voice portal (sometimes called a vortal) is a Web portal that can be accessed entirely by voice.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • voicemail - Voicemail is a method of storing voice messages electronically for later retrieval by intended recipients.
  • voicemail preview - Voicemail preview is a feature of unified messaging, and in particular voice-to-text messaging programs such as Microsoft Exchange.
  • VoiceXML - VoiceXML is an application of the Extensible Markup Language (XML) which, when combined with voice recognition technology, enables interactive access to the Web through the telephone or a voice-driven browser.
  • VoIP (voice over IP) - VoIP (voice over IP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks.
  • VoIP caller ID (Voice over Internet Protocol caller identification) - VoIP caller ID (Voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in much the same way as caller ID on a conventional telephone line but with enhanced features and flexibility.
  • VoIP phone - A VoIP phone is a hardware- or software-based telephone designed to use voice over IP (VoIP) technology to send and receive phone calls over an IP network.
  • VoIP trunk gateway - A VoIP trunk gateway is an interface that facilitates the use of plain old telephone service (POTS) equipment, such as conventional phone sets and fax machines, with a voice over IP (VoIP) network.
  • VOIPSA (Voice over IP Security Alliance) - VOIPSA (Voice over IP Security Alliance) is a cross-industry coalition of individuals and organizations from the security and VoIP communications sectors.
  • vomit - Vomit (spelled all lower-case) is a Unix software utility that takes IP telephony packets captured by another Unix tool, tcpdump, and reassembles them into a Wave file that can be listened to over a computer's speakers.
  • Vonage - Vonage is a communication platform as a service (CPaaS) provider for consumers and businesses that makes it possible for customers to connect and communicate on any device through cloud-hosted voice, video, chat and short message service (SMS).
  • VoWLAN (Voice over WLAN) - VoWLAN (Voice over WLAN) is a method of sending voice information in digital form over a wireless broadband network.
  • Wi-Fi Multimedia (WMM) - Wi-Fi Multimedia (WMM), previously known as Wireless Multimedia Extensions (WME), is a subset of the 802.
  • wideband audio (HD voice) - Wideband audio, also known as HD voice, is a cellular technology that utilizes a wider frequency spectrum to achieve greater voice quality during phone calls.
  • wireless WAN (Wireless Wide Area Network) - A wireless WAN is a wide area network in which separate areas of coverage or cells are connected wirelessly to provide service to a large geographic area.
  • wireline communication - Wireline communication (also known as wired communication) is the transmission of information over a physical filament.
  • wiretap Trojan - A wiretap Trojan is a program that surreptitiously records VoIP calls.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close