Telephony Provider Glossary

12 Jul 2019
0

Learn the Telephony Provider Lingo! Like any other industry, those of us who provide Business Phone Systems and Call Center Solutions have a lot of buzzwords that may not be familiar to everyone.

Here are a few such terms, along with their definitions.

A

Abandoned Call 
An abandoned call is when the caller disconnects while he or she is on hold and waiting for a call center agent. The caller may call back at a later time, but may become dissatisfied and call a competitor. As the call volume increases, the abandon rate usually increases. Experts consider the optimum abandoned call rate to be 3 percent to 5 percent.

Asynchronous Transfer Mode (ATM)
ATM is a type of wide-area network circuit that is used to transmit voice, video and data. All information sent over an ATM network is broken into packets of a fixed size, which means the performance is predictable and manageable.

Automated attendant
An automated attendant offers a customizable way for an organization to quickly route incoming calls to their destinations. Organizations can use automated attendants to connect callers with the right parties faster and hire fewer operators or receptionists.

Automatic call distribution (ACD)
An ACD is a system that receives incoming phone calls and routes them to the appropriate contact center agent. ACDs are used in businesses and contact centers that handle large volumes of incoming callers who may require assistance from any number of different people.

Automatic number identification (ANI)
ANI is a feature that allows the telephone company to capture the billing phone number of the calling party. ANI is similar to caller ID, but with ANI, the caller’s phone number and line type are captured even if caller ID is blocked.

Availability
Availability of any IT system is based on the probably of a hardware failure. Availability takes into account the type and number of hardware components in a system and the mean time between failure (MTBF) for these components. If an IP telephony switch has a predicted MTBF of approximately 135,600 hours, and each failure requires one hour mean time to repair (MTTR), then availability is 99.9993%. This achieves five-nines of availability, and it means the switch will be unavailable for one hour every ten years.

B

Bring-your-own-device (BYOD)
With the huge popularity of mobile devices, many people want to use their personal smartphones, tablets and other mobile devices to access business applications and information. They won’t need to carry different mobile devices for work and personal use, and they will be able to make and receive personal and business calls, while maintaining their business and personal personas. Companies can also save the cost of buying smartphones and tablets for their workers. A successful BYOD initiative requires careful management and security to protect the business from risk.

C

Call center
A central location of an organization that handles high volumes of inbound and outbound calls, typically for sales, service or support.

Call detail record (CDR)
Business phone systems generate detailed logs of calls, which can be saved for processing and analysis. Service organizations that bill by the hour, such as legal and advertising firms, often input the information from call detail records into their customer billing systems.

Caller identification (Caller ID)
Caller ID is used to allow the called party to see the calling party’s name and telephone number before picking up the phone. Caller ID can be blocked by the calling party.

Capital expense (capex)
Capex includes all of the equipment required, including hardware and software, planning, installation, initial setup and integration with other systems. Capex declines over time, as IT products continue to improve in price/performance and new features. See operational expenses (opex).

Click to call
The ability to launch a phone call directly from the contact list on your computer.

Cloud-based VoIP or unified communications (UC)
Most IP voice and unified communications systems today are deployed on-premises, but cloud services are becoming increasingly popular. With a cloud service, costs are more predictable than with an on-premises solution. A cloud-based business phone system is both hosted and managed by the provider. The VoIP or unified communications system is located in the provider’s secure data centers and the provider owns, configures and manages it.

Communications-enabled applications
These applications have directly integrated communications functionality. Key applications include collaboration, contact center, notification applications, reporting and analytics.

Communications-enabled business processes (CEBP)
When business applications are integrated with communications applications to improve operations and workflow, it is known as communications-enabled business processes. CEBP can be used in collaboration, contact center, notification applications, and reporting and analytics tools.

Computer telephony integration (CTI)
CTI refers to any technology that enables integrated interaction on a telephone and a computer. Examples include screen pops, automatic dialing and call center functions.

Conferencing
Conferencing allows two or more people to interact using audio (audio conferencing), audio and video (video conferencing), or a combination of audio, video and information sharing using a Web browser (web conferencing). Conferencing reduces the need for travel and encourages collaboration among employees, customers and partners who may be at different physical locations.

Contact center
A contact center handles high volumes of inbound and outbound calls, Web chats, instant messaging, emails, faxes and other forms of communications, typically for sales, service or support. A contact center also typically uses blended agents, who can manage multiple forms of voice and data-centric customer communications.

Customer relationship management (CRM)
Software that manages all aspects of an organization’s interactions with its customers, clients and prospects.

D

Denial of Service (DoS)
DoS or distributed DoS (DDoS) attacks are favorites of criminals, political operatives as well as disgruntled customers, former employees and social protestors. DDoS attacks have become highly organized and complex, which makes them harder to fight. In a DDoS attack, the network is bombarded with traffic, resulting in a slowdown or crash of the applications and servers. Every organization using IP telephony should have backup telephone lines in case of a DDoS attack.

Direct inward dial (DID)
DID is used for call routing, and it enables external callers to contact a user directly at his or her unique phone number. In the UK, it is called direct dial-in (DDI).

E

Employee-liable mobile device
A mobile device, such as a smartphone or tablet, that’s owned by the employee, not the organization, but is used to access corporate applications and data.

Enhanced 911 (E911)
When IP telephony or mobile phone users dial 911, E911 is used to allow the location of the user to be known to the call receiver. E911 support is required by the FCC for mobile phones and IP phones.

Ergonomics
The science of designing products, machines and systems to maximize the safety, comfort and efficiency of the people who use them. Ergonomics takes into account psychology, physical measurement, environment and more to ensure that products are adapted to suit workers and their specific needs. Keep ergonomics in mind as you look at the handsets and software of unified communications systems.

F

Find me, follow me
This IP telephony feature allows an employee to program his or her extension to ring based on status, such as allowing the call through when he or she is in the office, forwarding to a mobile phone when there is no answer, or forwarding to a colleague when the line is busy. Find-me, follow-me improves worker productivity and customer service by ensuring that every call reaches the right person, regardless of where he or she is working.

Firewall
A firewall sits between two networks, such as a company’s network and the Internet, to prevent access by unauthorized users. A firewall monitors and controls the flow of data in and out of the network and can intercept, analyze and stop a wide range of malicious attacks. Make sure your company’s firewall supports IP voice.

Fixed mobile convergence (FMC)
FMC solutions integrate cellular services with private communications networks, either wired or wireless. Users are accessible via a single number and can use of enterprise telephony features from their mobile phones. FMC can provide cost savings by eliminating expensive roaming charges on mobile networks, especially for international calls. See also mobile unified communications.

Frame relay
Frame relay is a type of wide-area network connection. Frame relay circuits are less expensive than private leased lines because the carrier shares the frame relay bandwidth among many customers. When properly engineered, frame relay can provide a cost-effective way to transmit IP telephony traffic and still guarantee quality of service.

G

G.711
G.711 is an ITU-U standard that describes the 64-kbps pulse code modulation (PCM) voice coding technique. In G.711, encoded voice is already in the correct format for digital voice delivery in the public switched telephone network or through PBXs.

H

H.323
H.323 is a standard that facilitates videoconferencing over packet-based networks. It includes a complete suite of protocols for audio, video and data conferencing. SIP and MGCP protocols have become more popular than H.323 over time.

Hosted VoIP
In a hosted VoIP or unified communications system, the carrier, vendor or solution provider runs and manages the system. Costs are more predictable than with the traditional on-premises model where businesses buy, build and manage their own phone systems.

Hunt groups
On a business phone systems, hunt groups ensure that all calls are answered by a live person, rather than having to wait in a queue or go to voicemail. An incoming call can ring extensions in a specified sequence or ring multiple extensions at once, depending on the company’s preference.

I

IEEE 802.11 wireless LAN
Wireless LANs use radio technologies to provide connectivity for smartphones, tablets, IP phones, sensors and many other types of devices. 802.11 wireless LANs operate in the 2.4 GHz and 5 GHz radio bands. 802.11n is the newest and fastest technology and delivers up to 100Mbps performance–similar to or even better than wired networks. Older (but still compatible) technologies include 802.11a (54Mbps), 802.11b (11Mbps) and 802.11g (54Mbps).

IEEE 802.11e
802.11e is an enhancement to the 802.11 wireless LAN specifications that provides quality-of-service features, including the prioritization of data, voice and video. To ensure a quality user experience, quality of service should be used for real-time applications such as voice and video.

IEEE 802.11i
802.11i improves wireless authentication and encryption for wireless LANs. Together, 802.11i and Wi-Fi Protected Access 2 (WPA2), from the Wi-Fi Alliance, are used to secure wireless networks.

IEEE 802.1p
802.1p is a specification that gives Ethernet switches the ability to identify and prioritize traffic into eight classes of service. 802.1p works at the media access control (MAC) layer, or Layer 2.

IEEE 802.1X
802.1X authentication should be used to verify a user’s identity on a wireless LAN, so that unauthorized guests are not allowed to use the network. Laptops, tablets and smartphones can support 802.1X authentication, but Wi-Fi IP phones, which have less computational capacity, use simpler methods such as MAC address authentication or username and password.

Instant messaging(IM)
Real-time communication over the Internet using text-based messages. Often a key component of UC.

Interactive voice response (IVR)
IVR is a method of communication between customers and an automated system through the use of a telephone keypad or speech recognition.

IP contact center
Call centers using traditional PBXs can find that it is difficult and expensive to gradually increase the number of agents. With an IP-based contact center, companies can more easily growth their contact centers one agent at a time. In addition, IP contact centers can span across many locations, which gives the business greater flexibility than having to assemble a skilled team of agents in a single location. Agents can sign in from wherever they are (even at home) and be instantly online as part of the contact center team. Also called a virtual contact center or distributed contact center.

IP PBX
An IP PBX is a business phone system that delivers voice or video over a data network using IP. The previous generation of PBXs used time-division multiplexing, rather than IP.

IP phones
IP phones plug directly into the network and perform the necessary analog-to-digital and/or digital-to-analog conversions. You may need different models of IP phones based on various segments in your user population. For example, the legal department may need multi-line handsets with easy conference call capabilities, while the manufacturing floor needs a phone with fewer bells and whiles but good, loud sound and a rugged exterior.

IP telephony
IP telephony uses the IP network to carry voice, fax and other types of information that traditionally have been sent over the public switched telephone network. Also called voice over IP (VoIP).

IP telephony system architecture
Some IP telephony systems use a distributed system architecture, while others use a centralized architecture. In a centralized architecture, a central call control server provides dial tone for all phones. In a distributed model, the phone service is handled by multiple call control servers, which can be in different locations, and call control is provided by each switch in the system. A distributed system has greater reliability and resilience.

J

Jitter
Jitter can cause strange sounds to contaminate voice calls and users will complain about degraded voice quality. Jitter is caused by network congestion, how routers and switches queue up packets as well as network routing policies, such as traffic engineering or MPLS paths used by carriers. Latency, jitter and packet loss all impact voice quality.

K
L

Latency
Latency is the time it takes for a caller’s voice to be transported – packetized, sent over the network, depacketized and replayed – to the other person. Geographical distance and lower-speed network connections can cause delays. If latency is too high, the natural conversation flow will be interrupted. Latency should not exceed 100 milliseconds one way for toll-quality voice. However, participants can still carry on a decent conversation if latency is up to 150 milliseconds. Latency, jitter and packet loss all impact voice quality.

Leased lines
Leased lines are the most private wide-area network (WAN) connection, and they are direct point-to-point connections between your locations. Leased lines can be used for data, voice and Internet services. They are also the easiest type of WAN circuit to ensure a high quality of service for voice and other applications.

Least-cost routing
Used in voice communication to select the outbound communications path based on lowest cost.

M

Managed IP telephony services
In a managed services model, the customer owns the IP PBX and related equipment, and it resides either at the customer’s office or in the provider’s network, while the carrier or value-added reseller provides management and maintenance for the phone system.

Mean time between failure (MTBR)
MTBF is the predicted time between failures of a system during operation. MTBF is calculated as the average time between failures of a system. The hard disk drives, fans and power supplies of a business phone system are the components that are most likely to fail. Look for a system with the fewest moving parts.

Mean time to repair (MTTR)
The time to repair a device. A four-hour MTTR is the industry standard, which can be a challenge for businesses that want to maintain five nines of availability for the IT systems. Redundant systems are usually added to ensure the appropriate levels of availability. Modular, distributed systems also make repair easy and results in a lower MTTR.

Media Gateway Control Protocol (MGCP)
MGCP, also known as H.248 and Megaco, is an ITU-U standard for handling the signaling and session management needed during a multimedia conference. MCGP defines the communication between a media gateway, which converts the data for use on a circuit-switched network, to the format required for a packet-switched network and the media gateway controller.

Metro Ethernet
A metropolitan area network that is based on Ethernet standards and is used to connect subscribers to the Internet or to their own offices in the region. 10-Gbps Ethernet services are increasingly popular for metro Ethernet.

Mobile device management (MDM)
MDM software secures, monitors and manages mobile devices, such as smartphones and tablets. MDM software usually distributes applications and enforces data and configuration settings for mobile devices, and includes the ability to lock or delete data from a lost or stolen mobile device. MDM can also be provided as a service.

Mobile unified communications (mobile UC)
A mobile UC solution includes common telephony functions, presence status, messaging, calendar, visual voicemail, videoconferencing and document sharing/collaboration from a smartphone or tablet.

Mobility Router
A mobility router is a network appliance that combines IP telephony, enterprise wireless LANs, carrier cellular networks and location technology to extend voice and unified communications to mobile devices. A Mobility Router allows users to make and receive calls from enterprise and personal mobile phone numbers by automatically selecting the best network (Wi-Fi or cellular) to optimize cost, call quality and battery life.

Moves, adds and changes (MACs)
The administration necessary when users or network components are moved, added or changed on the network. When the moves, adds and changes for your phone system need to be done by a reseller or solution provider, rather than your own IT administrator or office manager, expenses can quickly add up.

Multiprotocol Label Switching (MPLS)
Many large enterprise and service provider networks use MPLS to create full mesh connectivity across the wide-area network without having to manage virtual circuits.

N

N+1 redundancy
A business phone system with a distributed architecture that allows for use of N+1 redundancy will provide high levels of reliability. N+1 redundancy means that extra parts, such as voice switches, can be added to provide redundancy and there is no single point of failure. A 1:1 redundancy means that all hardware must be doubled, which doubles the hardware cost.

Net Promoter Score (NPS)
SATMETRIX’s Net Promoter Score® is a globally recognized metric used to measure customer loyalty. NPS is a measurement of an individual’s willingness to recommend a company or product to others. A score of 50 or above is considered world class.

Network assessment
A network assessment provides a comprehensive performance assurance and real-time verification of unified communications performance right to the users’ desktops. A network assessment will help scout out problems before IP voice or video is deployed. Any business deploying IP voice should first conduct a network assessment.

O

Operational expenses (opex)
Opex is the cost involved once a given service is operational, including operational management, user education, support, troubleshooting and related labor-intensive services. Opex costs increase over time, as personnel costs rise. See capital expenses (capex).

P

Packet loss
Packet loss results in a metallic sound or conversation dropouts in IP phone systems. Packet loss can be caused by network congestion, distance and poor line quality. Because VoIP is a real-time service, there’s no way to recover lost packets. Even one or two percent packet drop results in noticeably degraded voice quality. Latency, jitter and packet loss all impact voice quality.

Power over Ethernet (PoE)
With PoE, electrical power and data are transmitted on Ethernet cabling. On today’s networks, IP phones plug directly into the Ethernet network, rather than having a separate power source. The IEEE 802.3af Power over Ethernet standard can be used to power IP phones, video surveillance camera and other devices. The original IEEE 802.3af standard provides up to 15.4 watt of DC power, where the newer IEEE 802.3at (also known as PoE Plus) provides up to 25.5 watts of power.

Presence status
The ability to see a colleague’s presence status, such as in the office, away, on the phone, or in a meeting. A user’s presence status should change automatically if the person is on the phone or scheduled to be in a meeting. Presence services are expanding to include the presence and location information between multiple sources.

Private branch exchange (PBX)
A PBX telephone system is based on time-division multiplexing (TDM) and they were traditionally deployed by organizations until the arrival of IP-based phone systems in the late 1990s.

Public switched telephone network (PSTN)
The network of the public circuit-switched telephone lines, which allows any phone in the world to connect with any other phone. The International Telecommunications Union (ITU) creates the standards that govern the technical operations of the PSTN.

Q

Quality of service (QoS)
There are a number of ways to identify and mark which applications and traffic should receive high priority transmission over the network. These methods include virtual LANs, DiffServ, Type of Service, IEEE 802.1p, IP address, and source and destination ports. Different QoS methods may be used at Layer 2 and Layer 3, and to ensure that quality of service can be enforced end-to-end across the network, you must ensure that these QoS methods can be translated from one layer to another.

R

Real-Time Transport Protocol (RTP)
An IP standard that provides end-to-end network transport functions that can be used by application transmitting real-time voice, video or data over unicast or multicast network services.

Reliability
Reliability generally refers to hardware reliability. Reliability is determined by calculating how often the system fails compared to the percentage of the time that the system is available. In the telephony world, five nines of reliability is the acceptable benchmark. This means the system is available at least 99.999 percent of the time. Reliability is different than availability.

Return on investment (ROI)
ROI is used to justify a purchase decision. In IT, ROI is about the productivity an organization gains by implementing a particular technology. For unified communications, this productivity could be qualitative, such as customer satisfaction, or end-user productivity, such as increased call volumes or the productivity of contact center agents. ROI and total cost of ownership (TCO) are often confused. See also total cost of ownership.

S

Seamless roaming
When a person walks from one location to another using a mobile device, he or she counts on roaming capabilities of the wireless LAN to keep the application or voice call connected. Invisible to the user, the underlying wireless infrastructure hands off the user from one wireless access point to the next, while performing the necessary re-association and re-authentication in the background.

Service level agreement (SLA)
An SLA is part of a service contract where the level of service is defined. SLAs can be between service providers and customers, or businesses and their internal departments. An SLA may describe the service uptime, application response time, application performance, time to repair, and other measurable details. An SLA for voice quality might include call completion rate, delay from when the last digit is dialed until a user hears a ringing or busy signal, and a mean opinion score to measure voice quality.

Session border controller (SBC)
If you are using SIP trunks to connect your company’s different locations, you should add a session border controller to protect against malicious attacks. An SBC ensures that only approved traffic passes into the heart of your business. An SBC also hides your internal network and your users IP addresses from the outside world, which provides additional security protection.

Session Initiation Protocol (SIP)
SIP is a signaling protocol used to establish a session in an IP network, from a simple telephone call to a multimedia conference session with many participants. SIP establishes, manipulates and tears down sessions. However, there are many different “flavors” of SIP, which can create interoperability issues. SIP is RFC 3261 from the Internet Engineering Task Force (IETF).

Skills-based routing
In a contact center, skills-based routing is used to automatically route calls to the most appropriate agent, based on criteria such as language, experience or technical expertise.

Softphone
A softphone is a piece of software that runs on a PC, laptop, or mobile device, enabling the device to provide telephony capabilities. A softphone is particularly convenient for workers who travel frequently. With calls directed to a laptop and a headset plugged into the USB port, an employee can work from anywhere using the computer and its built-in microphone.

T

Telephony denial of service (TDoS)
TDoS refers to automatically generated call floods received by businesses – usually their contact centers. For example, attackers can flood the contact center’s IVR or agents with hundreds or thousands of concurrent calls to disrupt the business or to generate calls for revenue. See also denial of service.

Telepresence
Telepresence is a set of technologies that provides video and sound quality that is as good as being there. Telepresence has extended the capabilities of videoconferencing beyond the boardroom to tablets and other mobile devices, facilitating collaboration.

Throughput
How much bandwidth your system needs, which depends on the number of simultaneous calls, the voice encoding scheme used by the IP phone or softphone, and the signaling overhead.

Toll fraud
Insider abuse or a compromised system may allow outsider access to the phone system to make calls, often internationally. Toll fraud can cost companies millions of dollars.

Total cost of ownership (TCO)
TCO helps you determine which specific vendor’s product you should purchase. TCO is the measure of what technology costs to own. For unified communications, these costs could include capital expenses such as hardware and software, implementation and training, system management, and network and long distance charges. The focus for organizations should be on choosing products that reduce these tangible costs over the lifetime of owning the system. TCO and return on investment (ROI) are often confused. See also return on investment (ROI).

Trunk line
Trunk lines connect the PBX to public switched telephone network. In older PBX phone systems, ISDN, T1, E1 and DS3 were commonly used for trunk lines. Today, SIP trunks are often used.

U

Unified communications (UC)
UC provides a single interface through which users can access a wide range of communications options, including voice, instant messaging, email, conferencing and more.

Unified communications and collaboration (UCC)
UCC integrates multiple communications channels and enables communication and collaboration within workgroups and across company boundaries. UCC includes voice and telephony, conferencing, messaging, presence status and instant messaging, and these capabilities can be accessed from a variety of devices. Products may be a standalone suite or a portfolio of integrated applications and platforms.

Unified messaging
Unified messaging is the integration of email, SMS, fax, voicemail and video messaging into a single interface and accessible from a variety of devices. Unified messaging simplifies the user experience because all types of messages are stored in one place.

V

Virtual contact center
A virtual contact center leverages an IP-based contact center solution that allows agents to work from different locations and even from home. A virtual contact center scales more effectively and allows businesses to leverage expertise across locations, rather than hoping to find a highly skilled team in one location. Also called an IP contact center.

Virtual LANs (VLANs)
Many organizations use virtual LANs (VLANs) to logically separate devices and departments on the same physical network. Isolating different groups’ traffic from one another provides an additional layer of security. Giving voice traffic its own VLAN will deliver a better user experience. Using VLANs also reduces the impact of multicast or broadcast traffic.

Virtual private network (VPN)
A VPN is a private network used by a company, and in many cases, its partners or associates, to communicate over a non-private network. VPN traffic can be carried over a public network infrastructure such as the Internet. Internet-based VPNs offer the least amount of administrative control to regulate and guarantee quality of service to ensure a good voice experience.

Virtualization
Virtualization is the creation of a virtual (rather than an actual) version of something, such as an operating system, server, storage device or network. For example, server virtualization essentially tricks the operating system into thinking that a group of servers is a single pool of computing resources, and that allows IT to run multiple operating systems simultaneously on the same machine. Virtualization allows companies to consolidate servers, increase operational flexibility and deliver higher application availability.

Voice over IP (VoIP)
VoIP is a method of sending voice calls over the IP data network. This can apply to the public Internet or private IP networks. Also called IP telephony and IP voice.
Voice over wireless LAN (VoWLAN)
Running IP voice over a wireless LAN.

W

WAN optimization
WAN optimization products accelerate your applications by eliminating redundant transmissions, staging data in local caching, compressing and prioritizing data, and streamlining chatty protocols. This makes more room for your real-time applications, such as voice and video.

Weighted Fair Queuing (WFQ)
WFQ is a quality of service method that is used on routers and switches. WFQ allows traffic flows to share the network, but provides prioritization for small, time-sensitive traffic. This way, a large traffic flow, such as a backup, will not clog the pipe or create lengthy delays for smaller flows, such as voice.

Wi-Fi
Wi-Fi is a trademark of the Wi-Fi Alliance, an industry organization. Wi-Fi is used to describe products that have passed the organization’s interoperability tests; however, the term Wi-Fi is commonly used to describe wireless LANs.

Wide area network (WAN)
A telecom network that spans great distances, often across a metropolitan or regional area, but also across countries.

Wideband audio
Wideband audio (50 Hz to 7,000 Hz) is preferred for business phone systems, because it makes conversations sound better and reduces errors in translation. Wideband audio more than doubles narrowband (300 Hz to 3,400 Hz). An IP PBX should support both wideband and narrowband.

Wireless LAN
Wireless LANs use radio technologies to provide connectivity for smartphones, tablets, IP phones, sensors and many other types of devices. Smaller wireless LANs use access points (APs) to provide the service, while larger wireless LANs also use mobility controllers to control and manage the many access points.

Wireless Multimedia (WMM)
WMM is used to deliver quality of service for voice and other applications on wireless LANs. WMM defines four priority levels to support different types of traffic, including voice, video, best effort for data and background traffic. WMM is a Wi-Fi Alliance certification that’s based on the IEEE 802.11e standard.

Comments

There are currently no comments on this article.

You must be a registered user to make comments

Add new comment

Your name:

Related Vendors